Bredy Network Management Corporation Blogs

2 minutes reading time (422 words)

Tip of the Week: How to Protect Yourself from Invoice Impersonation

Tip of the Week: How to Protect Yourself from Invoice Impersonation

As cybercriminals become increasingly sophisticated in their methods of attack, it is important that your staff--the ones on the front lines--are educated to spot these attempts and know what to do if one is encountered. In order to spot these attacks, it is important to know what to look for.

Unfortunately, the increased sophistication of these attacks have made them harder to spot and resultantly, harder to avoid. This has led to a rise in the use of an attack vector known as an invoice impersonation attack. When utilizing these attacks, a cybercriminal will send a message under an assumed name (often one that belongs to a regular contact in actuality) that includes an invoice number and a link, presumably to download the invoice.

However, rather than downloading the invoice, as expected, the target of an attack will discover that they have actually downloaded some malware. This is often how ransomware is introduced into a system.

Warning Signs
To avoid falling victim to an invoice impersonation attack--or any form of email phishing or fraud--your users should know to keep their eyes out for any warning signs.

Messages containing a payment request and link
One of the bigger security issues with the concept of email is the fact that most users can only take it on good faith that the message comes from the person it appears to have. There is no voice to identify as someone else’s, and no handwriting to compare to the actual person’s.

Therefore, if an email comes from someone with a request for payments to be made, with a link to what is claimed to be a payment portal, don’t click. You might have just dodged a ransomware program delivered via a phishing attempt.

How to Protect Your Business (with the Help of Your Employees)
Phishing attacks, including invoice impersonation attacks, rely on their target to trust the content enough to not question if the sender is who they say they are. As such, they can be avoided with a little mindfulness on the part of your employees.

Make sure your employees know to keep an eye out for risk factors. Requiring regular training sessions as well as testing their cybersecurity mindfulness will help to keep awareness alive and well among your staff members.

Furthermore, you should have updated spam filters and malware blockers installed to help minimize the risk that these messages even make it to your staff in the first place. This is where BNMC can help.

If you’re interested in the solutions we have that can help make cyberthreats a non-issue, give us a call at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, June 25 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Malware Privacy Hackers Business Computing Software Internet Business Google Network Security Hosted Solutions Ransomware Microsoft Computer Mobile Devices Android IT Services Smartphone Managed IT Services Windows Backup Data Management Tech Term Small Business Internet of Things Cloud Computing Browser User Tips Innovation Cybersecurity App Business Continuity Hardware Windows 10 Data Artificial Intelligence Gmail Server Saving Money IT Support Remote Monitoring Business Management Data Recovery Encryption Word Smartphones Outsourced IT Productivity Windows 10 Chrome Productivity Managed Service Provider Facebook Phishing IT Support Tip of the week Efficiency Data Backup Vulnerability Infrastructure Disaster Recovery Office 365 Passwords Big Data Government Settings Data storage Money Antivirus YouTube Robot Social Media Risk Management Google Drive Bandwidth Upgrade Office Tips Managed IT Services Applications Communication Analytics IT Management communications Maintenance Virtual Private Network Firewall SaaS VoIP Holiday Network Microsoft Office BYOD Alert Employer-Employee Relationship Two-factor Authentication Spam Computing Workplace Tips Outlook Avoiding Downtime WiFi Mobile Device Paperless Office Monitors LiFi Vendor Management Scam Hosted Solution Save Money Administration HIPAA Automation Website Content Filtering Mouse End of Support Data loss Mobile Security Miscellaneous Unified Threat Management VPN Telephone Systems Virtual Reality Apple Data Security Server Management Business Technology The Internet of Things Storage Touchscreen SharePoint Printing Connectivity Microsoft Excel Business Growth Collaboration IT Technicians Optimization Password Modem Writing Managed IT Smart Technology Legal Staff Leominster Wi-Fi Quick Tips Techology Regulations Company Culture Computers Statistics Tablet Downtime Unified Communications Drones Document Management Spyware Language Value How To Lenovo Cybercrime Windows 8 Uninterrupted Power Supply Marketing Downloads Computer Care IBM IoT Mail Merge Blockchain Hacker File Sharing Mirgation Recycling Dark Data Unified Threat Management Solid State Drive Cookies Retail Shortcut Distributed Denial of Service Deep Learning Wireless Augmented Reality K-12 Schools VoIP Gadgets Social Networking Managing Stress Display Bluetooth Comparison Identity Theft Computing Infrastructure Professional Services Politics Firefox Superfish Customer Service Training Corporate Profile Star Wars Address Permissions Alt Codes Chatbots eWaste Users User Error Halloween Hard Disk Drive Nanotechnology Office Samsung Patch Management Managed IT Service Bring Your Own Device Operating System Automobile Wearable Technology Network upgrade Dell Motherboard Cables Specifications Budget Alerts USB Tech Support Customer Relationship Management Social Chromebook Heating/Cooling Multi-Factor Security Information Technology WannaCry Fraud Cost Management Typing Humor Cabling Identity Continuity Time Management Printer Scary Stories Current Events Screen Reader Social Engineering Break Fix Best Practice Google Maps Smart Office Wires Search Black Friday Licensing Dongle Websites Networking Running Cable Solar Servers Google Calendar Buisness Apps Assessment Emergency Cryptocurrency Network Management Access Control Sports IT solutions Going Green Smart Tech Safety Dark Web Virtual Desktop Google Docs Work desktop Router Voice over Internet Protocol Remote Computing Cyber Monday Digital Payment Cooperation Service Level Agreement Laptop Education Hacks Compliance Business Intelligence Network Congestion Legislation Google Wallet Digital Hotspot Internet Exlporer Bitcoin Disaster Cleaning CCTV FinTech Processors Machine Learning Virtualization Unsupported Software Webcam Update Mobile Device Management Error Computer Repair Relocation Ben McDonald shares Mobile Data Point of Sale Recovery How To Work/Life Balance Travel Mobile Computing G Suite Health Private Cloud Black Market Supercomputer CrashOverride Staffing Law Enforcement Motion Sickness Taxes Notifications Administrator Electronic Medical Records Web Server what was your? BDR Twitter IT Budget Physical Security Emoji GPS Upgrades Gadget IT Consultant Crowdsourcing Cameras Personal Information Botnet Cortana Tracking 3D Printing Meetings

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3