Consumers have the ability to manage their money through online banking, track spending, and transfer funds all with a click of a button… and so can cybercriminals.
With the changing technological tides, criminals are evolving and tailoring their methods to stay afloat. Nowadays, most consumers aren’t as worried about being mugged and having wallets stolen as they are about their bank accounts being quietly emptied before they’re aware they’ve been compromised.
Everything being processed online has businesses also dealing with the same wave of criminal activity and with numerous day-to-day transactions; a simple oversight can lead to detrimental financial loss.
An uninvited email can provide a hacker access to a company’s network and stands to be the most commonly used method to implant malware.
Those most at risk are small businesses that may not have the budget to implement security and counteract attempts to exploit their email accounts and computer systems.
While there is no foolproof way to prevent cyber-attack, there are strategies to protect against these advancing threats.
5 Ways to Spot and Avoid Business Email Fraud
1. Check, check, and check again
One clue that a hacker may be attempting to infiltrate your company’s email exchange is a message received with a domain similar, but not identical to, the legitimate domain name. Contact the authorized sender to confirm. Block bogus email domains at the exchange server level to protect your entire enterprise.
2. Implement fail-secure verification procedures
Critical tasks such as transferring money now require fail-secure verification. All money transfers and invoice payments should still be authorized in writing but confirmed verbally. This could include a call to the companies receiving funds to confirm wire numbers and deposit accounts. Consult with your banker. Many banks now offer two-stage transfer verification which requires two employees with separate authorization credentials to initiate and execute all money transfers.
- Beef up your computer security systems
Invest in layered computer security that use several safeguards. Block all emails with executable file attachments; the hacker’s tool of choice for planting virus. No antivirus software is 100% effective. Many IT specialists now recommend installing two competing products. Run them daily instead of weekly. Establish procedures to quickly pull infected work stations from your network to isolate threats.
- Put your knowledge to the test
One wrong click could open the floodgates to a data breach. McAfee, part of Intel Security, is the world's largest security technology company. They developed a "Phishing Quiz" to test user's knowledge of what a harmful email may look like. To strengthen your knowledge and awareness, take the quiz here.
5. Talk to your broker
Standard crime and theft insurance often do not anticipate loss due to computer fraud. Recently, insurers have started adding “social engineering fraud” coverage to their list of add-ons to standard crime policies. This reimburses companies for losses when misled into transferring funds based on fraudulent information. Talk to your Bukaty representative to determine the right coverage for your potential risks.
When it comes to protecting your business, be proactive. If we can help your business navigate through these present-day perils, please reach out, 913-647-3946.
As always, thank you for allowing us to be your trusted insurance adviser. Your business is appreciated.