Fake Invoice Email Scams and Office 365
WATCH VIDEO HERE
The fake invoice scam has been impacting an unbelievable amount of businesses lately costing £000’s every day.
Every other day there is a business hit with this type of attack and losing money to the bad guys. There are two ways this can happen. Either the attacker is impersonating one of your colleague or a supplier. The second way is your colleague’s or supplier’s email account got compromised. When the email account gets compromised they create a custom rule to forward all the emails from a certain sender to another email outside the organisation so that the recipient never sees them. In both cases, the attacker requests the funds to be transferred into a different bank than the normal bank. How to combat this?
First and foremost is the business process. Whenever there is a request to transfer funds to a new bank the sender should verify the bank details by calling the recipient. The simple and effective process would save millions of pounds to many UK businesses. We are assuming you are using Office 365 and a few other Office 365 technical measures that can help the recipient end are:
- Warn users of the external emails
- Create alerts when the forwarding rules are created
- Enforce 2-factor authentication
- Enable Anti-spoofing
- Educate your employees
These measures may sound rudimentary but there is a surprisingly large number of businesses that don’t have these in place and been a victim of this scam.
It is also a really good idea to consider going through the Cyber Essentials Certification that will ensure you have basic security controls in place before this happens to you.
We don't want this happening to your business. If you need any further help please reach out.
- Protecting your identity online
- What is a VPN and why do you need one?
- Quick tips to improve your board’s cybersecurity
- Password Management Software
- How to make of your employees the best line of cyber defence against cyberattacks
- Congratulations to the Techforce Sponsorship winners
- Certificate management processes
- What is Phishing and what can you do to prevent it?
- Found malware, now what do you do?
- Data breaches and other scary 2019 events- Special Halloween post
- How to get your cyber security budget approved by the board
- The TechForce Sponsorships
- How to start a career in the security industry
- Protecting your business in the cyber security era
- Secure Your Supply Chain
- Case study: British Airways Fined £183.4million for Data Breach
- The Silver Bullet in Cyber Security
- Is it a good idea to build your own Security Awareness Training platform?
- How to apply for the Cyber Essentials Voucher Scheme
- 5 things to consider when selecting a Security Awareness Training (SAT) platform
- 2 Years, Marmite and £600,000
- What is Business Email Compromise (BEC) and how to stop it
- Everything you need to know about Cyber Essentials
- Cyber Essentials Demystified
- How to choose a Security Awareness Platform
- How to pick the best Antivirus software for your business
- 6 Quick and Easy Email Security Tips for Dummies
- How to carry out a baseline email phishing test
- Hackers On Tour
- How to share passwords safely in your Small Business
- In the news - Warning. North Sea firms likely already attacked
- 10 Steps to Cyber Security
- 5 Reasons why you should consider having two monitors
- What is Email phishing & why you need security awareness training in your business
- 6 Top Tips to Prevent Cyber Attacks
- How to choose the best IT Service Provider for your business
- How to choose the best Antivirus software for your business
Protecting your identity online
Is it possible to really protect your identity online? How do “you” protect your identity online and how do others that have your identification details protect you in the ever expanding “online” aspect of computing?More
What is a VPN and why do you need one?
We tell you in this post why it is useful to have a VPN connectionMore
Quick tips to improve your board’s cybersecurity
For some CISOs, it is a challenge to communicate your priorities to the board. We provide you here with some quick tips to ensure your board knows more about cybersecurity and how to act upon it.More
Password Management Software
Remembering passwords is hard, we tell you how to store and share passwords safely with password management softwareMore
FOR LATEST UPDATES SUBSCRIBE HERE: