Steps you can take to defend against phishing, smishing and other forms of cyber attack
CYBER CRIMINALS SEND OUT a staggering number of bogus messages to businesses every year via email or messaging platforms. They’re “phishing” for ways to access proprietary and confidential data, or they’re trying to trick employees into taking an action that will benefit them—and harm your business.
These phishing attempts are usually called smishing when cyber criminals use SMS or messaging apps. They often use a tactic called spoofing, or impersonating a legitimate business or person, in an attempt to fool employees into clicking a link, opening an attachment, changing account information or conducting a financial transaction.
Clicking those links or opening those attachments can automatically install malware, which, depending on the type, could give the criminals access to your computer or device, install ransomware (in which malware infiltrates your system and cyber criminals hold your business hostage until a fee is paid), and even allow them to burrow further into your company's servers or the cloud. Let them in and they could steal your company’s confidential information and destroy the reputation you’ve worked hard to build with customers.
- Avoid clicking on links or attachments from untrusted sources.
- Educate employees to be alert to emails, messaging and phone calls that may be fraudulent.
- Use verified contact information from within the company’s internal contact management system when verifying requests to change information or transfer funds.
- Require multiple-person approvals for account and financial change requests.
- Encourage employees to ask questions and challenge suspicious activity before acting on requests.