No one likes to be fooled. Especially when it costs us money. You may have heard of phishing emails because they have been around for a long time. You may even think you know how to spot phishing emails, but the statistics show that successful phishing attacks are increasing.
Phishing emails are not going away anytime soon. Your business IS receiving these emails so, your business needs to know how to identify them and how to deal with them.
What are phishing emails?
‘Phishing emails’ is a term you might have often heard, but what are they? Phishing emails aim to trick the target into doing what the scammer wants you to do. This could be sending password information so they can get access to your accounts. It could be requesting credit card or payment details. The biggest threat is the delivery of Cryptolocker, a form of ransomware designed to encrypt all your files and hold them ransom.
It could be getting you to click on a link to infect your network with a virus. The email’s (and any web pages they lead you to) are all designed to look as genuine as possible, so they fool the reader into believing they are legit.
Awareness may be increasing but as the stats show phishing emails are still working, and the success rate is rising. That is bad news for businesses.
Think about how many emails you receive in a day. A business owner easily receives 50 emails each day. Now think about how many emails each member of staff receives in a day. Most businesses receive 100’s even 1,000’s of emails each day. Among all those emails lurk the danger of a phishing email that could cost your business a lot of money.
Because of the increase in effectiveness of phishing emails 59% of business decision-makers said it was the chief concern to their business (Study by cyber security experts Clear Swift).
The ransomware attack, WannaCry that caused so much damage in 2017 was initially spread by phishing emails. The damage they can create for a business is severe. Imagine a member of your staff clicks on a link in a phishing email and it locks all their files. The virus will then spread through your network and lock everyone’s files. Suddenly the whole business can no longer access any files. What would you do? What would your customers think? This isn’t an attempt by me to scare you; it’s making clear that phishing emails are serious business.
Many phishing emails ask that you click a URL that looks innocent but navigates to a malicious web page or to execute a download of malicious files. On the off chance that these URLs aren’t malicious, you should hover over them (don’t click it), and check if the URL goes where it says it does. You should be able to see the destination of the URL easily enough, which indicates whether or not you can trust it.
One of the easiest ways to identify a phishing email is if it asks for credentials or personal information of any kind. This could include usernames, passwords, credit card information, and much more.
A typical phishing email is a fake invoice. The email is made to look like a genuine invoice from a company you do business with. Just keep in mind that most large institutions generally contact you with other means if there’s something they need you to do for them; usually via direct mail or a phone call. Never hand over information via email to anyone.
More often than not, large companies that reach many people with their marketing campaigns or other offerings practice proper spelling and grammar in their emails. This isn’t always the case with phishing scams. If the message doesn’t look professional, it probably isn’t and should be treated as a threat.
Have you ever heard the saying, “If it’s too good to be true, it probably is!” This applies to phishing emails. If you receive messages that are offering you a small fortune or claim that you’ve won a lottery (especially if you did nothing to warrant doing so), chances are you’re dealing with a phishing scam. Promptly call your IT support provider. If this isn’t possible, then delete the email and then delete again from your deleted items folder.
One of the leading sources of dangerous ransomware and other computer threats comes in the form of an email attachment. Sometimes this might look like a CV, shipping information of an unexpected package, or some other document or zip file. No matter how legitimate it seems, if it is unexpected or not going through the proper channels, it’s best to follow up with the sender before opening the file. Don’t risk it if there are any red flags.
A very common phishing email pretends to be from an official company account telling you there is a problem with your account and urge you to click a link to verify your account details. The email will look extremely realistic and with all the correct contact details and correct spelling and grammar.
However, what about the sender address? In many instances, the scammer can’t fake the real address and are relying on the target not checking it. Sometimes there is only a slight change, maybe one letter missing from the domain name, e.g. Infotec.co.uk. Other times the sender address is a string of characters that is clearly made up. Check the sender address before you do anything, and if you’re still unsure call the company yourself to verify.
In the last example, I said that in many instances the scammer can’t use a real sender address. One of the latest phishing emails can use a genuine sender address; it is commonly known as CEO fraud.
Here are some examples of the latest phishing emails that are being sent through to businesses. These have been taken from the emails we have received in the last month.
This email has been made to look realistic but look at the sender address. By checking that sender address, you can see this isn’t real.
Again, look at the sender address on this example, and you can see that it’s not a real email.
When you hover over the link in this email, it showed that the link didn’t go to EDF Energy and was unrelated to that site, meaning the link is most likely malicious and should not be clicked.
Install a spam filter
You will never be able to stop all spam emails, but anti-spam can minimise how many hit your inbox. The good news is there is a wide range of anti-spam products to choose from, but that can also make it difficult it pick the best one for your business.
We recommend anti-spam and robust email security products to all our customers and any other businesses we talk with.
It is essential to make sure your computers are kept up to date will all the latest software updates. Many attacks exploit a vulnerability that is then fixed by a future update. If you don’t do that update, the vulnerability will still exist.
We offer a service of regular patching to make sure all your machines have the latest updates installed.
Phishing emails are becoming more and more sophisticated. That is why their effectiveness increased between 2016 and 2017. Because the phishing emails and the scammers behind them have become so sophisticated, it’s impossible to stop all of them hitting your inbox. Even the very best anti-spam will not be able to stop all spam emails. The emails that make it past antivirus and email security are so realistic they are tricking employees.
Create a training guide, or use an existing one, to help educate your employees on how to spot phishing emails and avoid clicking on the malicious links. We use an excellent training resource called KnowBe4 that sends emails to your staff to test how good they are at spotting phishing emails.
Phishing emails are an ever-evolving form of cyber attacks. We can help you by installing and then managing anti-spam and other security products to reduce the number of phishing emails making it to your inbox.
Using KnowBe4 we can help you educate, train and test your staff and their understanding of phishing emails.
We can also help take you through Cyber Essentials certification to give you extra piece of mind about your cyber security. Get in touch to find out more about how we can help your business and your staff with phishing emails.
Phishing emails are not going away any time soon. In fact, they are becoming more sophisticating and more successful. I’ve given you five tips to get started on protecting your businesses from the phishing email threat. If you haven’t installed anti-spam or email security solution start by doing that. If you have already done that you will want to double check that they are both up to date and are set up correctly. You must also test and educate your staff regularly because that is going to be the best way to protect your business. Even if you stop all but one phishing email reaching inbox, if that email is opened and the link is clicked all that protection was for nothing.
Phishing emails are already costing USA businesses millions of pounds. If you think it won’t happen to you, then please think again.
Depending on your current IT solutions there may be some costs involved, but they are far smaller than the cost of doing nothing at all.
Computer Medic On Call is committed to bringing you the highest quality computer service available for all of your information and systems needs. Serving in Broward and West Palm Beach in Florida State for IT Support. Our experience provides us with the skills to offer a range of high quality computer services.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
|cookielawinfo-checbox-analytics||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".|
|cookielawinfo-checbox-functional||11 months||The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".|
|cookielawinfo-checbox-others||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.|
|cookielawinfo-checkbox-necessary||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".|
|cookielawinfo-checkbox-performance||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".|
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.