

Business Technology Topic of the Month
What Is a Compromised Email Account? The Meaning & Telltale Signs to Look Out For
What is a Compromised Account?
A compromised email account occurs when an attacker or unauthorized individual access a legitimate user's email. Once attackers gain access to an email account, they can look at and copy all emails sent or received from that account- and any personal information attached to those messages.
Email accounts can be compromised by attackers' tactics, such as phishing and password spraying. Phishing involves the attacker tricking a user into revealing login credentials through fraudulent emails or websites, while password spraying involves trying common passwords across multiple accounts. Malware can be used to hack into email accounts.
If you suspect your email account has been compromised, you should immediately change the password to a new one that's hard for others to guess and enable two-factor authentication. You should also notify your service provider about the breach so they can help recover any lost mail or files as needed. Let your contacts know that you've had a security breach so they don't unknowingly engage in fraudulent activity stemming from your account.
It is essential to practice good cybersecurity to protect yourself from compromised email accounts. This includes using strong, unique passwords, being cautious of suspicious emails or links, regularly updating your devices and software, and using reliable antivirus and anti-malware software.
How Are Accounts Compromised?
- Phishing: Attackers create fraudulent emails that appear to be from a legitimate source, such as a well-known company or service. The emails may contain links prompting users- who are most likely expecting this kind of communication and don't check the URL before entering their login credentials-into believing they need to log back into something important. Once attackers have compromised these accounts, they can then use them for malicious purposes.
- Password Attacks: Attackers may use techniques like password spraying to try a small number of commonly used passwords across multiple accounts. They exploit weak or reused passwords to gain access to email accounts.
- Malware: Malware, including keyloggers and spyware, can be installed on a device without the owner's knowledge. This malicious software records login credentials (such as passwords) and sends them to an attacker.
- Credential Stuffing: Attackers exploit the practice of password reuse by using leaked login credentials (such as passwords) and sends them to an attacker.
- Social Engineering: Attackers may use manipulative tactics to trick individuals into revealing their email account login information. This may involve impersonating a trusted source, like a friend or coworker, or eliciting personal information through deceptive means.
To protect against email account compromise, staying vigilant and practicing good cybersecurity hygiene is crucial. This includes using strong, unique passwords, enabling two-factor authentication, being cautious of suspicious emails or links, and regularly updating devices and software.
What Are The Different Types of Account Compromise?
Business and personal accounts can be compromised in various ways, such as malicious phishing emails sent to employees or a data breach allowing unauthorized users to gain access. Weak passwords, malware, and social engineering attacks can all compromise personal accounts.
- Email Account Compromise (EAC): Hackers most commonly gain access to people's email accounts by planting malware on their computers, usually after the victim has fallen for an initial email phishing scam. This can lead to various fraudulent activities like sending spam emails and stealing sensitive information- or sending official-looking messages to other contacts from the victim's email, trying to trick users into giving up personal or financial data.
- Account Takeover (ATO): ATO occurs when a cybercriminal takes control of an individuals online identity and impersonates that person. Attackers can exploit these compromised accounts for financial gain and other malicious activities.
- Business Email Compromise (BEC): BEC refers to an attack where cyber criminals target employees responsible for financial transactions or sensitive information. Attackers often impersonate high-ranking executives, tricking employees into making unauthorized wire transfers or sharing sensitive data.
- Credential Stuffing: In this attack, attackers use username and password combinations obtained from previous data breaches to gain unauthorized access to various online accounts, including email accounts. They rely on the fact that many individuals reuse passwords across multiple platforms.
It is important to remember that this is just a small sample. New email hacking techniques are being developed all the time. So staying on top of solid security measures like using unique and strong passwords and enabling multi-factor authentication is your first line of defense. Being cautious with suspicious emails or links also helps mitigate the risk of account compromise.
What Are The Telltale Indicators of a Compromised Account?
It is important to act fast if you think your email account has been compromised. Start by changing the password to something secure, then take the necessary steps to ensure no further damage can be done. Some signs of a breach to look out for include:
Unfamiliar messages sent from your account
If you notice emails sent from your account that you did not write, this is a clear sign that someone else has gained access to the account, especially if the emails are sending messages and links to others. If other people are also complaining to you about receiving spam emails from your email address, then your account has likely been hacked.
Unexpected password reset notifications
Getting messages about changing passwords when you haven't changed anything may signal that someone else has tried to gain access.
Missing emails
Sometimes, hackers delete emails to cover their tracks, which can signify that someone else has accessed your account.
Other unusual activity
You may also watch for unusual activity from privileged accounts, increased access to services, or increased network activity. Also, watch for logins from unusual locations or strange emails being sent out, unauthorized settings, or registry changes. Finally, contact your IT department or security provider for additional help securing your account.
Steps to Take if Your Account Has Been Compromised
Change your password
Immediately change your password for the compromised account. Choose a strong and unique password not used for other accounts. This will help prevent further unauthorized access.
Check for and remove suspicious activity
Review your account activity and look for any unfamiliar or suspicious actions. If you notice any unauthorized activity, such as emails sent from your account without your knowledge, delete them and notify your contacts to avoid any potential scams.
Enable multi-factor authentication (MFA)
If available, enable MFA for your account. This adds an extra layer of security by requiring a second form of verification such as a code sent to your phone, in addition to your password.
Update you security settings
Review and update your account security settings. Ensure your recovery options, such as alternate email addresses or phone numbers, are current. Consider changing security questions and answers as well.
Scan your device for malware
Run a complete computer or mobile device scan with up-to-date security software. This can help to detect and remove any malware or keyloggers that may have compromised your account.
Be cautious of phishing attempts
Remain vigilant for phishing emails or messages that trick you into providing personal information or login credentials. Avoid clicking on suspicious links or downloading attachments from unknown sources.
Monitor your accounts
Check your financial accounts, credit reports, and other online accounts regularly for sign of unauthorized activity. If you notice any suspicious transactions or activity-report it immediately!
Report the compromise
Depending on the type of account, report the compromise to the appropriate service provider or organization. They can assist in recovering your account and take steps to prevent further compromises.
Remember, prevention is vital to account security. Changing your passwords regularly, using strong and different passwords for each account, and avoiding sharing personal information online is wise.
Tips & Best Practices to Prevent Accounts from Being Compromised
The best way to approach cybersecurity is preemptive. Taking proactive steps to secure your accounts can go a long way in preventing unauthorized access and safeguarding your data:
- Use strong passwords with uppercase and lowercase letters, numbers, and special characters.
- Enable two-factor authentication if available for additional protection.
- Check your inbox regularly for any suspicious emails or activities.
- Set up email filters to automatically delete or block known malicious emails.
- Use a secure email provider with built-in security measures to help protect your accounts from unauthorized access.
- Keep up with security updates and patch any vulnerabilities immediately.
- Monitor your accounts for any suspicious activity or changes in settings, and contact your IT department immediately if anything is out of the ordinary.
ANATOMY OF A FAKE CHECK SCAM
Fake checks drive many types of scams- like those involving phony prize wins, fake jobs, mystery shoppers, online classified ad sales, and others. In a fake check scam, a person you don't know asks you to deposit a check-sometimes for several thousand dollars and usually for more than what you are owed- and wire some of the money back to that person. The scammers always have a good story to explain the overpayment- they're stuck out of the country, they need you to cover taxes or fees, you need to buy supplies, or something else. But by the time your bank discovers you've deposited a bad check, the scammer already has the money you sent, and you're stuck paying the rest of the check back to the bank.
The Federal Trade Commission receives tens of thousands of reports each year about fake checks. Over the last three years, the number of complaints has steadily increased, and so have the dollars lost.
The FTC's new info graphic developed with the American Bankers Association Foundation, offers some tip-offs to rip-offs and what to do if you get a check from someone you don't know.
Please share this information with others. Victims may be embarrassed to talk about their experiences, but you can help. A simple phone call, email or text, saying "Look what I just found" and sharing this information may make a difference in someone else's life.
Avoiding Cryptocurrency Scams
How to Avoid Cryptocurrency Scams!
Scammers are always finding new ways to steal your money using cryptocurrency. To steer clear of a crypto con, here are some things to know.
- ONLY SCAMMERS DEMAND PAYMENT IN CRYPTOCURRENCY. No legitimate business is going to demand you send cryptocurrency in advance- not to buy something, and not to protect your money. That's always a scam.
- ONLY SCAMMERS WILL GUARANTEE PROFITS OR BIG RETURNS. Don't trust people who promise you can quickly and easily make money in the crypto markets.
- NEVER MIX ONLINE DATING AND INVESTMENT ADVICE. If you meet someone on a dating site or app, and they want to show you how to invest in crypto, or asks you to send them crypto, that's a scam.
Spot Crypto-Related Scams
Here are some common investment scams, and how to spot them.
- A so-called "investment manager" contacts you out of the blue. They promise to grow your money- but only if you buy cryptocurrency and transfer it into their online account. The investment website they steer you to looks real, but it's a fake, and so are their promises. If you log in to your "investment account", you won't be able to withdraw your money at all, or only if you pay high fees.
- An online "love interest" wants you to send money or cryptocurrency to help you invest. That's a scam. As soon as someone you meet on a dating app asks you for money, or offers you investment advice advice, know this: that's a scammer. The advice and offers to help you invest in cryptocurrency are nothing but scams. If you send them crypto, or money of any kind, it'll be gone, and you typically won't get it back.
- Scammers guarantee that you'll make money or promise big payouts with guaranteed returns. Nobody can make those guarantees. Much less in a short time. And there's nothing "low risk" about cryptocurrency investments. So: if a company or person promises you'll make a profit, that's a scam. Even if there's a celebrity endorsement or testimonials from happy investors. Those are easily faked.
- Scammers promise free money. They'll promise free cash or cryptocurrency, but free money promises are always fake.
- Scammers make big claims without details or explanations. No matter what the investment, find out how it works and ask questions about where your money is going. Honest investment managers or advisors want to share that information and will back it up with details.
- IF YOU SEE A TWEET ( OR A TEXT, OR OTHER MESSAGE ON SOCIAL MEDIA) THAT TELLS YOU TO PAY WITH CRYPTOCURRENCY, THAT'S A SCAM!
Avoiding Cryptocurrency Scams
How to Avoid Cryptocurrency Scams!
Scammers are always finding new ways to steal your money using cryptocurrency. To steer clear of a crypto con, here are some things to know.
- ONLY SCAMMERS DEMAND PAYMENT IN CRYPTOCURRENCY. No legitimate business is going to demand you send cryptocurrency in advance- not to buy something, and not to protect your money. That's always a scam.
- ONLY SCAMMERS WILL GUARANTEE PROFITS OR BIG RETURNS. Don't trust people who promise you can quickly and easily make money in the crypto markets.
- NEVER MIX ONLINE DATING AND INVESTMENT ADVICE. If you meet someone on a dating site or app, and they want to show you how to invest in crypto, or asks you to send them crypto, that's a scam.
Spot Crypto-Related Scams
Here are some common investment scams, and how to spot them.
- A so-called "investment manager" contacts you out of the blue. They promise to grow your money- but only if you buy cryptocurrency and transfer it into their online account. The investment website they steer you to looks real, but it's a fake, and so are their promises. If you log in to your "investment account", you won't be able to withdraw your money at all, or only if you pay high fees.
- An online "love interest" wants you to send money or cryptocurrency to help you invest. That's a scam. As soon as someone you meet on a dating app asks you for money, or offers you investment advice advice, know this: that's a scammer. The advice and offers to help you invest in cryptocurrency are nothing but scams. If you send them crypto, or money of any kind, it'll be gone, and you typically won't get it back.
- Scammers guarantee that you'll make money or promise big payouts with guaranteed returns. Nobody can make those guarantees. Much less in a short time. And there's nothing "low risk" about cryptocurrency investments. So: if a company or person promises you'll make a profit, that's a scam. Even if there's a celebrity endorsement or testimonials from happy investors. Those are easily faked.
- Scammers promise free money. They'll promise free cash or cryptocurrency, but free money promises are always fake.
- Scammers make big claims without details or explanations. No matter what the investment, find out how it works and ask questions about where your money is going. Honest investment managers or advisors want to share that information and will back it up with details.
- IF YOU SEE A TWEET ( OR A TEXT, OR OTHER MESSAGE ON SOCIAL MEDIA) THAT TELLS YOU TO PAY WITH CRYPTOCURRENCY, THAT'S A SCAM!
May 2025 Security Tip
Data Breach Response: A Guide for Business
You just learned your business experienced a data breach. Whether hackers took personal information from your corporate server, an insider stole customer information, or information was inadvertently exposed on your company's website, you are probably wondering what to do next.
What steps should you take and whom should you contact if personal information may have been exposed? Although the answers vary from case to case, the following guidance from the FTC can help you make smart, sound decisions.
Secure Your Operations
Move quickly to secure your systems and fix vulnerabilities that may have caused the breach. The only thing worse than a data breach is multiple data breaches. Take steps so it doesn't happen again.
- Secure physical areas potentially related to the breach. Lock them and change access codes, if needed. Ask your forensics experts and law enforcement when it is reasonable to resume regular operations.
Mobilize your breach response team right away to prevent additional data loss. The exact steps to take depend on the nature of the breach and the structure of your business.
Assemble a team of experts to conduct a comprehensive breach response, Depending on the size and nature of your company, they may include forensics, legal, information security, information technology, operations, human resources, communications, investor relations, and management.
- Identify a data forensics team. Consider hiring independent forensic investigators to help you determine the source and scope of the breach. They will capture forensic images of affected systems, collect and analyze evidence, and outline remediation steps.
- Consult with legal counsel. Tall to your legal counsel. Then, you may consider hiring outside legal counsel with privacy and data security expertise. They can advise you on federal and state laws that may be implicated by a breach.
Stop additional data loss. Take all affected equipment offline immediately- but don't turn any machines off until the forensic experts arrive. Closely monitor all entry and exit points, especially those involved in the breach. If possible, put clean machines online in place of affected ones. In addition, update credentials and passwords of authorized users. If a hacker stole credentials. your system will remain vulnerable until you change those credentials, even if you've removed the hacker's tools.
Remove improperly posted information from the web.
- Your website: If the data breach involved personal information improperly posted on your website, immediately remove it. Be aware that internet search engines store, or "cache", information for a period of time. You can contact the search engines to ensure that they don't archive personal information posted in error.
- Other websites: Search for your company's exposed data to make sure that no other websites have saved a copy. If you find any, contact those sites and ask them to remove it.
Interview people who discovered the breach. Also, talk with anyone else who may know about it. If you have a customer service center, make sure the staff knows where to forward information that may aid your investigation of the breach. Document your investigation.
Do not destroy evidence. Don't destroy forensic evidence in the course of your investigation and remediation.
Fix Vulnerabilities
Think about service providers. If service providers were involved, examine what personal information they can access and decide if you need to change their access privileges. Also, ensure your service providers are taking the necessary steps to make sure another breach does not occur. If your service providers say they have remedied vulnerabilities, verify that they really fixed things
Work with forensics experts. Find out if measures such as encryption were enabled when the breach happened. Analyze backup or preserved data. Review logs to determine who had access to the data at the time of the breach. Also, analyze who currently has access, determine whether that access is needed, and restrict access if it is not. Verify the types of information compromised, the number of people affected, and whether you have contact information for those people. When you get the forensic reports, take the recommended remedial measures as soon as possible.
Check your network segmentation. When you st up your network, you likely segmented it so that a breach on one server or in one site could not lead to a breach on another server or site. Work with your forensics experts to analyze whether your segmentation plan was effective in containing the breach. If you need to make any changes, do so now.
Have a communications plan. Create a comprehensive plan that reaches all affected audiences- employees, customers, investors, business partners, and other stakeholders. Don't make misleading statements about the breach. And don't withhold key details that might help consumers protect themselves and their information. Also, don't publicly share information that might put consumers at further risk.
Anticipate questions that people will ask. Then, put top tier questions and clear, plain-language answers on your website where they are easy to find. Good communication up front can limit customers' concerns and frustration, saving your company time and money later.
Notify Appropriate Parties
When your business experiences a data breach, notify law enforcement, other affected businesses, and affected individuals.
Determine your legal requirements. All states, the District of Columbia, Puerto Rico, and the Virgin Islands have enacted legislation requiring notification of security breaches involving personal information. In addition, depending on the types of information involved in the breach, there may be other laws or regulations that apply to your situation. Check state and federal laws or regulations for any specific requirements for your business.
Notify law enforcement. Call your local police department immediately. Report your situation and the potential risk for identity theft. The sooner law enforcement learns about the theft, the more effective they can be. If your local police aren't familiar with investigating information compromises, contact the local office of the FBI or the U.S. Secret Service. For incidents involving mail theft, contact the U.S. Postal Inspection Service.
Did the breach involve electronic personal health records? Then check if you're covered by the Health Breach Notification Rule. If so, you must still notify the FTC and, in some cases, the media. Also, check if you're covered by the HIPPA Breach Notification Rule. If so, you must notify the Secretary of the U.S. Department of Health and Human Services and, in some cases, the media.
Notify affected businesses. If account access information-say, credit card or bank account numbers- has been stolen from you, but you don't maintain the accounts, notify the institution that does so it can monitor the accounts for fraudulent activity. If you collect or store personal information on behalf of other businesses, notify them of the data breach.
If Social Security numbers have been stolen, contact the major credit bureaus for additional information or advice. If the compromise may involve a large group of people, advise the credit bureaus if you are recommending that people request fraud alerts and credit freezes for their files.
Notify individuals. If you quickly notify people that their personal information has been compromised, they can take steps to reduce the chance that their information will be misused. In deciding who to notify and how, consider:
- State laws
- the nature of the compromise
- the type of information taken
- the likelihood of misuse
- the potential for damage if the information is misused
For example, thieves who have stolen names and Social Security numbers can use that information not only to sign up for new accounts in the victim's name, but also to commit tax identity theft. People who are notified early can take steps to limit the damage.
When notifying individuals:
- Consult with your law enforcement contact about the timing of the notification so it doesn't impede the investigation.
- Designate a point person within your organization for releasing information about the breach, your response, and how individuals should respond.
- Consider using letters, websites, and toll-free numbers to communicate with people whose information may have been compromised. If you don't have contact information for all of the affected individuals, you can build an extensive public relations campaign into your communication plan, including press releases or other news media notification.
- Consider offering at least a year of free credit monitoring or other support such as identity theft protection or identity restoration services, particularly if financial information or Social Security numbers were exposed. When such information is exposed, thieves may use it to open new accounts.
April 2025 Security Tip
Account Takeover Fraud (ATO)
What is ATO?
In Account Takeover Fraud (ATO), cyber criminals deliberately gain unauthorized access to a victim's online bank, payroll, health savings or social media account, with the goal of stealing money or information for personal gain. Cyber criminals may gain access to a victim's online account through a variety of methods:
- Brute Forcing username/password- A cybercriminal exploits weak password and lack of multi-factor authentication.
- Phishing email-A cybercriminal sends a deceptive email to trick the victim into giving away their login credentials.
- Phishing domains/websites- A cybercriminal uses a phishing website that appears as a legitimate online banking or payroll website to trick the victim into giving away their login credentials.
- Social Engineering-A cybercriminal manipulates the victim into giving away their login credentials by impersonating a bank employee, customer support or technical support personnel.
- Data breaches- A cybercriminal obtains victim's login credentials from past data breach or criminal forums that sell data breach data on the dark web marketplaces.
- Malware- A cybercriminal obtains a victim's login credentials via malware on the victim's device.
The goal of the cybercriminal is to steal funds, redirect paychecks, or otherwise affect funds of the targeted victim.
SEARCH ENGINE OPTIMIZATION (SEO) POISONING ATO
In one specific type of scam, cyber criminals buy ads that masquerade as legitimate companies to misdirect victims searching for a specific website through popular search engines such as Google, Yahoo, or Bing. The search engine may return a fraudulent website URL that is very similar to the legitimate website, or slightly misspelled, or re-directed to another website with the URL that appears legitimate.
When victims click on the fraudulent search engine ad, they are directed to a sophisticated phishing site that mimics the real website, tricking victims into providing their login information. Cyber criminals then capture victims' credentials as they access the fraudulent site.
If the account requires multi-factor authentication, cyber criminals may utilize social engineering to obtain the One-Time Passcode (OTP). For example, cybercriminals pretend to be a bank employee or technical personnel and requests the victim to provide their phone number via fraudulent website's chat box. The cybercriminal then contact the victim while pretending to be the bank employee/technical support and ask for the OTP.
If the account is a corporate account which requires two individuals to authorize a transaction (dual control) then, cyber criminals may utilize social engineering in a similar manner as above, and insist that the second individual go to the same website, and/or go to the open browser of the first individual to complete the transaction. Cybercriminals then use the captured credentials to gain full access to the victim's financial account. If a bank account is compromised, cyber criminals can transfer money from the accounts. If an employer payroll account, health savings account, or retirement account is accessed, the cybercriminal can change the direct deposit information in the real site and redirect funds. If cyber criminals gain access to full personally identifiable information (PII) for victims, they can also create new account relationships, including loans or accounts that defraud victims.
STAY PROTECTED
To remain on guard against ATO, follow the tips below:
- Be careful about the information you share online or on social media. By openly sharing things like a pet's name, schools you've attended, your date of birth, or information about your family members, you can give scammers all the information they need to guess your password or answer your security questions.
- Monitor your financial accounts on a regula basis for irregularities, such as missing deposits.
- Always use unique complex passwords, enable two-factor authentication on any account that allows it, and never disable it.
- Use Bookmarks or Favorites for navigating to login websites rather than clicking on Internet search results or advertisements. Multi-factor authentication will not protect you if you land on a fraudulent login page. Carefully examine the email address, URL, and spelling in any correspondence.
- Stay vigilant against phishing attempts. Be suspicious of unknown "banking" or "company" employees who call you; don't trust caller ID. Offer to call them back after you look-up the phone number yourself. Remember that companies generally do not contact you to ask for your username, password, or OTP.
March 2025 Security Tip
Cybersecurity Tips for Tax Season
Every February through April, there is a rise in tax fraud by cyber criminals keen on stealing your personal and business's financial data. Learn how to prevent these types of attacks by being aware of the scams they use and having a solid cybersecurity program in place.
Common Tax Fraud Issues
- Impersonating IRS Phone Scams: Callers claim to be IRS employees, say that you owe money and it must be paid as soon as possible via gift cards or a wire service. The real IRS will not call and demand immediate payment. In general, they will send a notice or bill via the mail.
- Phishing, Email and Malware Scams: Cybercriminals will attempt to get valuable data via unsolicited emails, text messages, or fake websites that prompt users to click a link and open attachments to share personal or financial information or to release malware or spyware into a computer system.
- Dishonest Tax Firms: Tax preparation companies with little or no credibility open and close quickly during peak tax season. These businesses might not have secure systems, allowing cybercriminals to easily access your information.
Cybersecurity Tips for Tax Season and Beyond
You can protect your business from tax fraud scams and cyber attacks by implementing employee cybersecurity training and data privacy verification procedures, such as:
- Do not share social security numbers or any tax documentation with unknown parties.
- Keep an eye on your credit report to see if any bank accounts are being opened in your name.
- Look for any business loans being taken out under your company EIN.
- Triple check information prior to sending any wire or ACH transfers. Call a known number directly (not using the email signature), and ensure that multiple parties review before pushing through any payment.
- Stop, think, and double-check rush demands with other team members or management. Threat actors tend to use urgency in an attempt to rush people to make a mistake.
- Do not open attachments unless it is one you expected. If in doubt, have IT look at the email in an abundance of caution.
- Do not allow someone requiring access to your computer unless you can confirm whether they are legitimate with your IT department. Always gather their contact information, confirm and call back if necessary. It is not common practice for someone unknown to call and ask for remote access.
- Use secure passwords and don't share or reuse them.
- Ensure your communicate with an authentic individual and not an imposter trying to steal personal and financial information. If you are not familiar with the person's name, verify their relationship with your company before sharing any data.
- Utilize multi-factor authentication (MFA) when filing taxes online. Use a tax preparing service that requires a username, complex password and MFA.
- Update software on all devices and operating systems that connect to the internet. Having current software that is fully patched is a strong defense against viruses and malware.
February 2025 Security Tip
What is business email compromise (BEC)?
Business email compromise (BEC) is a type of cybercrime where the scammer uses email to trick someone into sending money or divulging confidential company info. The culprit poses as a trusted figure, then asks for a fake bill to be paid or for sensitive data they can use in another scam. BEC scams are on the rise due to increased remote work.
Types of business email compromise scams
- Data theft- Sometimes scammers start by targeting the HR department and stealing company information like someone's schedule or personal phone number. Then it's easier to carry out one of the other BEC scams and make it seem more believable.
- CEO fraud- Scammers either spoof or hack into the CEO's email account, then email employees instructions to make a purchase or send money via wire transfer. The scammer might even ask an employee to purchase gift cards, then request photos of serial numbers.
- Account compromise- Scammers use phishing or malware to get access to a finance employee's email account, such as an accounts receivable manager. Then the scammer emails the company's suppliers fake invoices that request payment to a fraudulent bank account.
- False invoice scheme- Posing as a legitimate vendor your company works with, the scammer emails a fake bill- often closely resembling a real one. The account number might only be one digit off. Or they may ask you to pay a different bank, claiming your bank is being audited.
- Account compromise- Scammers use phishing or malware to get access to a finance employee's email account, such as an accounts receivable manager. Then the scammer emails the company's suppliers fake invoices that request payment to a fraudulent bank account.
- Lawyer impersonation- In this scam, attackers gain unauthorized assess to an email account at a law firm. Then they email clients
How do BEC scams work?
Here's what happens in a BEC scam:
- Scammers research their targets and figure out how to fake their identify. Sometimes they create fake websites or even register companies with the same name as yours in a different country..
- Once they have access, scammers monitor emails to figure out who might send or receive money. They also look at conversation patterns and invoices.
- The scammer tries to gain the target's trust and then asks for money, gift cards, or information.
- During an email conversation, the scammer impersonates one of the parties by spoofing the email domain. (The email address might be off by a letter or two, or it might be the correct email address "via" a different domain.
Targets of business email compromise
Anyone can be a target of a BEC scam. Businesses, governments, nonprofits, and schools are all targeted, specifically these roles;
- New or entry level employees who won't be able to verify an email's legitimacy with the sender.
The dangers of BEC
If a business email compromise attack is successful, your organization could:
- Lose hundreds of thousands to millions of dollars.
- Face widespread identity theft if personally identifiable information is stolen.
- Accidentally leak confidential data like intellectual property.
Business email compromise examples
Example #1: Pay this urgent bill
You work in your company's finance department. You get an email from the CFO with an urgent request about an overdue bill- but it's not actually from the CEO. Or the scammer pretends to be your repair company or internet provider and emails a convincing-looking invoice.
Example #2: What's your phone number?
A company executive emails you, " I need your help with a quick task. Send me your phone number and I'll text you." Texting feels safer and more personal than email, so the scammer hopes you'll text them payment info or other sensitive information. This is called "smishing" or phishing via SMS message.
Example #3: Your lease is expiring
A scammer gets access to a real estate company's email, then finds transactions in progress. They email clients, "Here's the bill to renew your office lease for another year" or "Here's the link to pay your lease deposit.
Example #4: Top secret acquisition
Your boss asks for a down payment to acquire one of your competitors. "Keep this just between us," the email says, discouraging you from verifying the request. Since M&A details are often kept secret until everything is final, this scam might not seem suspicious at first.
Follow these best practices to stop business email compromise:
Use a secure email solution
Email apps like Office 365 automatically flag and delete suspicious emails or alert you that the sender isn't verified. They you can block certain senders and report emails as spam.
Set up multifactor authentication (MFA)
Make your email harder to compromise by turning on MFA, which requires a code, PIN, or fingerprint to log in as well as your password.
Set security defaults
Administrators can tighten security requirements across the entire organization by requiring everyone to use MFA, challenging new or risky access, authentication, and forcing password resets if info is leaked.
Teach employees to spot warning signs
Make sure everyone knows how to spot phishing links, a domain and email address mismatch, and other red flags. Simulate a BEC scam so people recognize one when it happens.
Use email authentication tools
Make your email harder to s poof by authenticating senders using Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM) and DMARC.
Adopt a secure payment platform
Consider switching from emailed invoices to a system specifically designed to authenticate payments.
Business email compromise protection
Help protect your organization with solutions to detect suspicious email like Microsoft Defender for Office 365,,, which can:
- Automatically check email authentication standards, detect spoofing, and send emails to quarantine or junk folders.
- Use AI to model each person's normal email patterns and flag unusual activity.
- Configure email protection by user, domain, and mailbox.
- Investigate threats, find out who's being targeted, detect fake positives, and identify scammers in Threat Explorer.
- Check domain wide-email patterns and highlight unusual activity with advanced algorithms in Spoof intelligence.
January 2025 Security Tip
10 Cybersecurity Tips to Protect Your Small Business Data
Protecting Your Business Data: Where to Begin
The first step in securing your business is knowing what data you have. Start by identifying all connected devices, including desktop computers, laptops, smartphones, printers, and the applications your business relies on. This inventory gives you a clear picture of your digital infrastructure, enabling you to implement the proper measures to protect your data.
Over time, you've amassed a treasure trove of data that cybercriminals would love to exploit:
Customer Details: This includes emails, phone numbers, birth dates, and all email lists for marketing or sales records. Imagine losing all your customer emails or having them fall into the hands of scammers.
Website: Your website may contain email addresses, support ticket records, online reviews, and customer transactions. These can be exploited for identity theft or creating fake websites.
Social Media: Social media accounts hold data such as usernames and public profile information. Scammers can create fake profiles to send spam or malicious links or to impersonate you.
Invoices: Invoices contain your bank account details and customer contact information, which can be used for scams.
Payment Processing: Online checkouts are targets for stealing customer banking and personal information.
Inventory Data: If you maintain lists of your current stock.
Orders: If you hold on to customer information such as recent sales, payment details, email addresses, personal addresses, and phone numbers.
You can protect all this data by following basic security practices. Here are some foundational principles:
Keep Work Computers for Work Only: Avoid using business devices for personal activities, as this increases the risk of exposure to malware.
Uninstall Unused Programs and Disable Unused Accounts: To minimize potential vulnerabilities, regularly review and remove unnecessary programs or accounts.
Know who's using what and why: Ensure employees have unique login credentials and restrict administrative rights to only those who need them.
Guard Against Physical Theft, too. Remember to consider the risk of physical theft. Set up remote wiping, which allows you to delete data on a lost or stolen device remotely.
Ten Cybersecurity Practices for Small Businesses
Every business is unique, but there are a few things all employees can do to secure the business infrastructure.
1. Deploy antivirus software
Today, antivirus software is essential. But how do you choose the best one for your needs? Start by assessing your needs and selecting software that protects all your devices from spyware, ransomware, and phishing scams. Look for a software that provides both protection and cleaning capabilities to restore your devices to their pre-infected state.
After selecting the proper antivirus, keep it updated to defend against the latest threats and to patch any vulnerabilities.
Additionally, remember to secure your mobile devices, such as smartphones and tablets, as these are sometimes overlooked. However, a vulnerable device can be an open door for hackers to access your network and other devices storing information. Encourage your employees to password-protect their devices, install security apps, and encrypt their data to prevent information theft, especially when using public networks.
2. Keep everything up-to-date
*Regularly update your systems: Ensure that your operating system, applications, and antivirus software are always up-to-date on all devices, not just laptops and computers.
*Upgrade your operating system: Common operating systems like Microsoft Windows and Apple's macOS often release updates with improved security features and bug fixes. Enable automatic updates to keep your devices protected against the latest vulnerabilities.
*Remember to update all your devices and your website, too: Make sure that payment machines, security systems, and any internet-enabled smart devices are running on the latest software versions. Enable automatic updates when possible. Don't forget to update website platforms such as WordPress or Squarespace, as well as their plug-ins and third party extensions. When you log in to the administrator section of your website, set up automatic updates for your website and plug-ins to keep your digital space secure.
3. Back up your data
Regular backups are the key to protecting your data against ransomware attacks. In the event of an attack, you can wipe out infected computers, reset them to factory settings, and restore data from backups, eliminating the need to pay the ransom.
Consider using external hard drives for backups, as they provide a secure off-site location for your data. While cloud backups are convenient, physical backups offer additional security against cyber threats.
4. Create Strong, unique passwords for all your business accounts and devices
Your passwords should be at least ten characters long and contain a mix of uppercase and lowercase letters, numbers, and special characters. Avoid using predictable passwords like names, birthdays, or common patterns. If you have numerous accounts, consider using a password manager. It can assist you in creating and securely storing complex passwords, making it easier to manage multiple strong passwords without needing to remember each one.
Employees often reuse passwords across multiple accounts or choose simple, easy-to guess passwords. This practice makes it easy for hackers to gain access to multiple systems if they crack one password. Tall to them about the risks of this practice.
5. Implement 2 Factor Authentication (2FA)
Two-factor authentication adds an extra layer of security by requiring additional verification steps beyond a username and password. For example, after entering your password, you might need to input a unique code sent to your phone. This added step makes it significantly harder for criminals to access your accounts, even if they have your credentials.
Set it up on:
*Logins for important business accounts, such as bank accounts and emails.
*Accounts that store your payment information, such as eBay, Amazon, and PayPal
*Social media accounts, including Facebook, Instagram, Twitter, and LinkedIn
*Any specific industry or business-related software
6. Use a VPN when connecting to public Wi-Fi
Public Wi-Fi networks, such as those in airports, hotels, or cafes are often unsecured and vulnerable to attacks. Hackers can position themselves between you and the connection point through Man-in-the-middle attacks. Instead of your data going directly to the hotspot, it goes to the hacker, who then sends it to the hotspot. This allows them access to anything you send over the internet, such as emails, bank statements, credit card information, login details for websites, and more. Essentially, they can access your systems as if they were you. Hackers commonly distribute malware and create fake connection points to exploit these unsecured connections.
One of the things a VPN does is encrypt your data traffic. This means that even if an attacker intercepts your data, they won't be able to decipher it because it will appear as a bunch of gibberish to them. Since hackers typically target easy victims, once they see that you have a VPN set up, they are likely to move on to the next unprotected victim.
7. Don't click on that link! Protect your business from scams
Phishing messages often disguise themselves as communications from legitimate companies like banks, courier services, or government departments. These messages may include links to fake websites that look almost identical to the real ones, aiming to trick people into entering their bank details.
Sometimes, phishing emails include attachments that appear to be invoices or documents. When opened, these attachments can install malware on your computer without your knowledge.
Scams that target small businesses include:
*Impersonation Scams: Criminals may call pretending to be from government agencies, energy or telecommunications providers, banks, or the police and ask for sensitive information about your business to commit fraud.
*Invoice Scams: Involves receiving a fake invoice via email from what seems to be a legitimate supplier. Another version is receiving a request to cancel a recent payment or update bank account details, directing the business to make the payment to a new, fraudulent account.
- CEO Scams: Also known as 'CEO phishing' this scam involves an urgent fund transfer request appearing to be from a senior executive, such as the CEO or CFO, in hopes of prompting immediate action without verification.
8. Learn to Recognize Business Email Compromise
Business email compromise (BEC) occurs when criminals take control of a company's or individual's email account to commit fraud. This can include sending fake invoices, requesting changes to bank account details, or intercepting and altering payment information. Criminals often gain access through phishing emails posing as trusted contacts, asking for usernames and passwords, or containing harmful software links. Furthermore, compromised email accounts or data breaches can expose credentials used for BEC attacks.
Signs of Suspicious Emails
Uncommon or inconsistent Sender Addresses: Always check the sender's email address, especially if the email asks for money or account details. Common warning signs include: the "from" address doesn't match the display name, the "reply-to" header is different from the sender's address, and the email domain doesn't match the company domain."
Unusual Requests from Bosses, Business Partners, or Suppliers- Be cautious of emails from senior staff or business partners asking for payments or sensitive information.
Unexpected Invoices- Before paying any invoice, verify if the business is expecting it. Double-check the invoice details against previous payments to the same supplier. If something seems off, call the supplier using contact information from their official website, not from the email or invoice.
Urgent or Confidential Requests- Emails that ask for immediate payment or insist on confidentiality should raise alarms.
Unsophisticated Formatting and Typos- Examine the email from broken English, typos, or grammar mistakes. Emails sent at odd times can also be suspicious, especially if they supposedly come from a local business or person.
If you notice these signs, it's likely a Business Email Compromise scam. Pause and verify before taking any action.
9. Monitor your company's digital identity
To safeguard your brand and reputation from data breaches, it's important to actively monitor your company's digital identity. Your digital identity includes the trail of data points (digital footprint) left behind whenever you or your company interact online. This includes anything from name and biometrics to data like social media activity.
10. Educate your employees about cybersecurity
Cybersecurity is a shared responsibility, and it's important to raise awareness about cyber safety with employees. Here are some ideas to achieve this:
- Provide useful information: Share practical tips and real-life examples about cyber safety. Create an online resource with your company's cybersecurity guidelines and tips.
- Discuss cybersecurity: Keep the conversation simple by highlighting that online safety is similar to protecting one's money, family, house and privacy offline. Encourage employees to be cautious of offers that seem too good to be true and unexpected messages from strangers.
- Ensure secure and easy, flexible working: If your employees value the freedom of working from anywhere, prioritize protection on the go. Implement secure tools and guidelines for remote work to safeguard your business and make flexible working safe and straightforward.
- Set up and agree rules for safe web browsing, email use, social media sharing, AI use, passwords and the plan in case of oversharing, cyberattack, falling victim to a scam, or device loss.
You don't need a big budget or an IT department to stay safe.
December 2024 Security Tip
WHAT IS ACCOUNT TAKEOVER?
The average person has dozens of accounts needed for access to both personal and business websites, applications, and systems. Account takeover attacks (as the name suggests) attempt to gain access to those accounts, allowing the attacker to steal data, deliver malware, or use the account's legitimate access and permissions for other malicious purposes.
HOW DO ACCOUNT TAKEOVERS OCCUR?
For an account takeover attack to occur, the attacker needs access to the target account's authentication information- such as a username and password combination. Attackers can obtain this information in various ways, including:
- Credential stuffing: Credential stuffing attacks use bots to automatically attempt to log in to a user account using a list of common or breached passwords. These attacks are possible because many user accounts are protected by weak or reused passwords- a major security issue.
- Phishing: User credentials are a common target of phishing attacks, which often use malicious links to direct a user to a fake page for a service, allowing the attacker to collect their login credentials.
- Malware: Malware infections on a user's computer can steal passwords in various ways . These include dumping authentication information from browser or system password caches or recording a user's keystrokes as they authenticate to an account.
- Application vulnerabilities: Users are not the only entities with accounts on an organization's systems and networks. Applications also have accounts, and an attacker can exploit vulnerabilities in these accounts to take advantage of their access.
- Stolen cookies: The cookies stored on a user's computer can store information about their login session to allow access to an account without a password. With access to these cookies, an attacker can take over a user's session.
- Hardcoded passwords: Applications commonly need access to various online accounts to perform their role.. Sometimes, passwords to these accounts are stored in application code or configuration files, which may be exposed or otherwise leaked.
- Network traffic sniffing:: While most network traffic is encrypted and secure, some devices still use insecure protocols, such as Telnet. An attacker who can view this unencrypted network traffic can extract login credentials from it.
IMPACT OF ACCOUNT TAKEOVER ATTACKS
A successful account takeover attack grants the attacker the same access and permissions as the legitimate account owner. With this access, an attacker can take various actions such as:
- Data theft: Account takeover attacks can lead to the breach and exfiltration of vast amounts of sensitive, confidential, or protected classes of data like credit card numbers or personally identifiable information.
- Malware deliver: Account takeover attacks allow attackers to install and execute ransomware and other malware on corporate systems.
- Follow-on attacks: Once an attacker gains access to a legitimate account, they can use that access to carry out further attacks. Sometimes, gaining access to a specific account is only done for this purpose (e.g. attackers may steal login credentials in the hope that the user has reused passwords across multiple accounts)
- Lateral movement: A compromised account can provide an entry point for an attacker to an otherwise secure network. From this initial starting point, the attacker can expand their access or escalate privileges across other corporate systems, a process called lateral movement.
- Financial profit: Instead of using the compromised account themselves, the attacker may sell access to it on the dark web.
HOW TO DEFEND AGAINST ACCOUNT TAKEOVER ATTACKS
- Strong password policies: Many account takeover attacks take advantage of weak and reused passwords. Defining and enforcing a strong password policy- including testing if user passwords have been exposed in a breach--can make credential stuffing and password cracking attacks more difficult to perform.
- Phishing protection: Phishing attacks are a common method for attackers to steal user passwords. By filtering risky emails or blocking suspicious domains via Internet filtering, an organization reduces the risk of users inadvertently compromising their credentials.
- Multi-factor authentication (MFA): MFA uses multiple factors to authenticate a user, such as the combination of a password and a one-time password (OTP) generate by an authenticator app, or the use of hard keys in addition to a password. Enforcing MFA use on all accounts makes it harder for an attacker to take advantage of a compromised password.
- Application security testing: API Keys and authentication tokens exposed in APIs can grant attackers access to an organization's online accounts.. Enforcing strong authentication practices and scanning application code and configuration files for authentication material can protect against this.
- Login and API security: Credential stuffers try many different username and password combinations to try to guess valid login credentials. Login and API security solutions can help to identify and block these attacks.