1310 Nowell Road
Raleigh, NC 27607
Existing CSP Client: (919) 424-2060
SALES: (919) 420-3231
Email attacks cost North Carolina organizations millions each year. Learn how to stop email attacks from crippling you.
Business Email Compromise is an increasingly common cybercrime tactic today that doesn’t rely on technical vulnerabilities at all—it relies on you. Could you be putting your organization at risk?
A recent report by Palo Alto Networks has identified an uptick in Business Email Compromise attacks, as a result of the standardization of the attack vector. Cybercriminals can now acquire and deploy the weapon “as a service”, making attacks more effective and more common.
Similarly, Intuit has issued a warning to QuickBooks users about a new Business Email Compromise scam that is making the rounds.
Are you sure your business is properly defended about this tactic?
CSP, Inc. will help you mitigate the threat of Business Email Compromise. Get in touch with our team to discover how.
Business Email Compromise is a social engineering technique used by cybercriminals in which they pose as a business or member of a business in order to execute fraudulent payments. In order to effectively defend against scams like this, you have to first understand how they are executed.
In layman’s terms, a cybercriminal will write an email pretending to be from a known contact or organization (e.g. your bank), and request that a payment be processed—instead of sending the funds to a legitimate source, the payment will go to them.
Business Email Compromise can be carried out in a number of ways:
In some cases, cybercriminals may only spoof an email address, and in others, they’ll directly breach the target’s account.
Once a cybercriminal has gained access to a target’s email address, they can begin sending payment requests or simply redirect all invoices to a private folder for their perusal. Whether they’re redirecting incoming or outgoing funds, the end result is still the same—your business loses money.
Alternatively, cybercriminals can simply intercept an important financial document such as an invoice. They can either change the payment details or inform the recipient that the details have changed, substituting their own bank account for the business’.
Let’s look at the facts—the average wire fraud attack costs $567,000, and the highest recorded was $6 million. The FBI estimates that BEC attacks cost a total of $1.87 billion just last year.
If you’re skeptical of how this type of scam could cause so much damage, consider the average amount you’re sending or receiving via wire transfer or invoice payments. One small business lost $15,482 in an instant when a cybercriminal intercepted a PDF invoice and redirected the funds to their account.
If just one fraudulent or misplaced email could cost you tens of thousands of dollars, it quickly adds up. That’s why you need to understand how Business Email Compromise works and how to defend against it.
While the CEO is often a target, cybercriminals can do plenty of damage by going after other members of an organization. There are a number of key, high-value targets that make it worth the cybercriminal’s time to go after.
Whether it’s their authority or their access to confidential information, these groups are all at risk for Business Email Compromise:
Know Your Targets: By noting the above listed key targets, you can examine the role they play in cyber security, and how their access and authority is being protected:
Defend Your Organization: Implementing the right range of cyber security solutions can help to protect common points of penetration for cybercriminals:
Implement A Robust Security Policy: You need to dictate how members of the organization, top to bottom, contribute to your cyber security. Everyone with access to your IT environment should follow these best practices:
Plan Ahead To Mitigate Cyber-Risk: You need to develop a comprehensive cyber-incident response plan for your organization. Make sure to test it regularly, and update it to address any shortfalls. Make sure to implement your plan properly—it won’t work if your staff doesn’t know about it, and can’t participate in it:
Test Against Phishing: Share these tips with your employees to ensure they know how to spot a phishing attempt:
Even the most effective digital security measures can be negated by simple human error.
So much of cybersecurity is dependent on the user, and as such it’s vital that you properly educate your employees on safe conduct. The more your workforce knows about the security measures you have in place, the more confidently they can use the technology in a secure manner.
We can help—with PII Protect‘s proven cybersecurity curriculum, we’ll help you show your staff how to use business technology in a way that doesn’t put your business at risk.
We offer a comprehensive employee Cyber Awareness Training program developed by PII Protect that combines regular online training, simulated phishing attacks, and dark web monitoring. The three components of this curriculum include:
The bottom line is that everyone in your organization, top to bottom, is a potential target. Make sure everyone is following cyber security best practices and is protected.
If you need expert assistance defending against cybercriminals and training your staff to recognize social engineering scams, get in touch with CSP, Inc.
Learn more on how Managed IT Services can help your business.
Discover the best IT Company suited for your business.
Always at your service to provide the highest level of quality support to our customers.
Anthony Firth Client Engineer
“I’m passionate about building and fostering relationships, and finding solutions for success.”
Michael Koenig Client Account Manager
“I help clients stabilize and grow their IT infrastructure so they can focus on growing their core business.”
Josh Wilshire Systems Engineer Team Lead
“I strive to provide the highest level of quality service to our customers.”
Tommy Williams Sr. Hardware Engineer
“I’m driven by the steadfast belief that technology must serve as a business enabler. This mantra has driven 21
Years of successful partnerships.”
Stephen Riddick VP Sales & Marketing
“CSP doesn’t succeed unless your company succeeds.”
Stephen Allen Inventory Manager
“Through my intuition and genuine concern to help others I have built long-lasting relationships with our customers, co-workers and business partners.”
Scott Forbes VP Support Services
“Every day, I work with clients to help plan the future of their businesses.”
Michael Bowman vCIO
“Your IT problems become our IT solutions.”
Mark McLemore Project Engineer
“Managing internal and external operations to ensure that CSP provides quality and reliable customer service .”
Margie Figueroa Business Manager
“Providing quality internal and externals financial support to our customers and accounting support to CSP.”
Katie Steiglitz Accounting Administrator
“Some call me the CEO. I call myself the Cheerleader for an awesome team!”
William B. Riddick Founder & CEO
“CSP is here to assist you with your IT needs.”
Beth Wylie Inside Sales Manager
On What Questions You Need To Ask Before Signing Any Agreement.
"*" indicates required fields
Raleigh IT Support Company and IT Services Provider | CSP Inc.
1310 Nowell Rd,
Raleigh, NC 27607
Existing CSP Client: (919) 424-2060
SALES: (919) 420-3231
Receive email updates and informative marketing materials by subscribing to our newsletter.
"*" indicates required fields