5 Ways to Protect Your Business Email from Cybercriminal Attacks

5 Strategies to Protect Your Business from Email Compromise

In late Jan. 2015, the FBI and the Internet Crime Complaint Center released a public service announcement about the recent proliferation of the Business Email Compromise (BEC). Defined by the FBI as a “sophisticated global scam targeting small to large businesses,” BECs affected more than 2,000 victims worldwide in 2014 while inflicting upwards of $200 million in fraudulent losses. The FBI added that “with high confidence” they expect “the number of victims and the total dollar loss will continue to increase.”

What’s scariest about the particular strain of Business Email Compromise the FBI identified last year is how meticulously it was undertaken: cybercriminals would reportedly “monitor and study” their selected victims prior to initiating the scam. Then, they would send phishing or ransomware requests that would allow the email accounts of high-level business executives or accounting personnel to be hacked or spoofed; those accounts would then send out legitimate-looking requests for immediate wire transfers to suppliers and other associates.

The FBI Identified Six Other Common Characteristics of Business Email Compromise to Watch Out for:

  • Businesses and personnel using open-source email face the biggest threat
  • Besides executives, individuals responsible for financials are most targeted
  • Spoofed emails very closely mimic a legitimate email address
  • Personal email accounts get hacked more than business addresses
  • Fraudulent requests for money transfers are well-worded and specific to the business being victimized, including asking for appropriate dollar amounts
  • Fraudulent messages often coincided with business travel dates for executives whose emails were spoofed

So what can you do to protect yourself and your business?

Five Strategies to Protect Your Business from Email Compromise

1) Meticulously check addresses, subject lines, and body copies for any discrepancies. A fraudulent email account may be only one letter off from a legitimate one—or a single word may be spelled wrong in the email message itself. Either way, noticing from the get-go may save a lot of trouble.

2) Validate ANY links in ANY unfamiliar email before clicking on them. Hover over or right-click all links and look for a legitimate URL that matches the one the email came from—not long strings of jumbled numbers or letters. All it takes is one click on one bad link by one employee to compromise the data of your entire company.

3) Do not open ANY emails or attachments from ANY sender you don’t recognize. Last year’s CryptoLocker virus spread primarily through malicious PDFs, audio files, and other attachments that computer users unwittingly clicked on. If you don’t know the sender and aren’t expecting a file, don’t click on it!

4) Avoid using free, web-based email for business purposes. Establish a company website domain and use connected email accounts for all communications. Also, strongly consider a proactive monitoring solution, which should conduct regular malware scans and daily antivirus updates.

5) Mark any unsolicited email as spam or junk. If you have a strong firewall or monitoring solution backed by strong IT support, flagging suspicious-looking emails will help filter out future spam—and possibly alert security experts to spoofed or hacked accounts.

Avoiding the threat of email compromises and other malicious scams is critical to business success—but it’s not a task you should undertake alone. That’s where a trusted IT partner like CMIT Solutions comes in. Contact us today to find out how our proven security measures can keep you and your employees safe.

Back to Blog

Share:

Related Posts

15 Quick Keyboard Shortcuts to Supercharge Your Use of Microsoft Office

In late 2013 and early 2014, CMIT Solutions covered 10 tricks, tips,…

Read More

Personal Data at Risk if You Don’t Wipe Your Old Mobile Device

Over the last 12 months, the four largest mobile carriers in the…

Read More

Who Can You Trust with Your Information? Recent Poll Says Not Many Institutions

No technology trend has been more ubiquitous lately than online security (or…

Read More