The Times Australia
Google AI
The Times Technology News

.

Business email compromise attacks are on the rise

  • Written by NordLocker

Expert shares 5 simple steps to combat email threats every business should consider following

There’s an astounding 84% increase in business email compromise attacks, according to the latest Email Threat Report, which compares half-yearly statistics. The news should be particularly alarming to organizations that use email services as their main means of internal communication or correspondence with their partners and clients.

“Today, cybercriminals use highly sophisticated strategies to trick their victims into revealing sensitive information, sending money, or even giving access to their employer’s computer systems,” says Oliver Noble, a cybersecurity expert at NordLocker, an encrypted cloud storage service provider. “One of the most dangerous cyber threats to a business is social engineering, which occurs when hackers exploit human psychology to gain benefit. Unluckily, human error remains the most common reason for cybersecurity breaches.”

Data breach is one email apart

For irreparable damage to happen, a business needs just one well-constructed email to be opened and acted on by a vulnerable employee.

“The overwhelming amount of online communication has been causing many employees to be more distracted and less cautious about which emails they open and which links they click on,”  explains Oliver Noble. “Business email compromise attacks usually impersonate a trusted colleague or even the head of a company, a partner, or a well-known service provider to convince a recipient to engage in actions such as revealing confidential data, paying fake invoices, giving away their login credentials on a bogus webpage, or deploying malicious software, such as ransomware, on the victim's infrastructure.”

To avoid the doomsday scenario, Noble provides five easy-to-follow tips that can help protect your business from falling victim to email attacks.

5 steps to mitigate the risks of business email compromise

  • * Secure your email by training your staff to identify signs of malware, especially when an email contains attachments or links.
  • * Use spam filters. In recent years, email platforms have established filtering systems that are advanced in detecting unwanted emails. Even though they are not perfect, spam filters do a good job of screening out suspicious messages.
  • * Implement a secure file-sharing process. Despite being unsafe, email is still the most common means for file sharing. An encrypted cloud solution may be the most secure solution for sharing your sensitive files among colleagues and with third parties.
  • * Make sure your employees use strong, unique passwords to connect to your systems. Better yet, start using password managers and multi-factor authentication.
  • * Adopt zero-trust network access, meaning that every request for access to digital resources by a member of staff should be granted only after their identity has been appropriately verified.
     

ABOUT NORDLOCKER

NordLocker is the world’s first end-to-end encrypted cloud with a file encryption tool. It was created by the cybersecurity experts behind NordVPN – one of the most advanced VPN service providers on the market. NordLocker is available on various platforms, supports all file types, offers a fast and intuitive interface, and guarantees secure sync between devices. With NordLocker, files are protected from hacking, surveillance, and data collection. For more information: nordlocker.com.

Times Magazine

Why Car Enthusiasts Are Turning to Container Shipping for Interstate Moves

Moving across the country requires careful planning and plenty of patience. The scale of domestic ...

What to know if you’re considering an EV

Soaring petrol prices are once again making many Australians think seriously[1] about switching ...

Epson launches ELPCS01 mobile projector cart

Designed for the EB-810E[1] projector and provides easy setup for portable displays in flexible ...

Governance Models for Headless CMS in Large Organizations

Where headless CMS is adopted by large enterprises, governance is the single most crucial factor d...

Narwal Freo Z10 Robotic Vacuum and Mop Cleaner

Narwal Freo Z10 Robotic Vacuum and Mop Cleaner  Rating: ★★★★☆ (4.4/5) Category: Premium Robot ...

Shark launches SteamSpot - the shortcut for everyday floor mess

Shark introduces the Shark SteamSpot Steam Mop, a lightweight steam mop designed to make everyda...

The Times Features

AI Is Already Here. The Question Is Whether Your Business Is Built for It

We sat down with Nirlep Adhikari — CTO at LoanOptions.ai and Founder of Mount Mindforce — to cut...

Cleared to Land — and Cleared to Die: How a Runway Failure Killed Two Pilots in Seconds

A modern passenger jet, operating under full clearance, descending onto a controlled runway at o...

Leader of The Nationals Matt Canavan - press conference

CANBERRA PARLIAMENT HOUSE PRESS CONFERENCE WITH SHADOW WATER MINISTER MICHAEL McCORMACK; MURRAY-DA...

The Power Of An Uncomfortable Love

How challenging relationships can help us grow. Never have we lived in a time where relationshi...

US country favourite Larry Fleet joins 2026 Gympie Music Muster

Tennessee singer-songwriter Larry Fleet will bring his band to the Gympie Music Muster on Friday...

56 OF YOUR FAVORITE DISNEY STARS SHINE BRIGHT IN DISNEY ON ICE PRESENTS MAGIC IN THE STARS!

The most Disney characters in one show and the on-ice debut of Raya from Raya and the Last Dragon...

How much do you really need to retire? It’s probably a lot less than $1 million

Every few months, someone in the superannuation industry declares that Australians now “need” ar...

South Australian Nationals to open up local oil from Great Australian Bight

Amid out-of-control inflation and impacts from the Middle East conflict, The South Australian Na...

How does your super balance compare to other people your age?

If you have ever checked your super balance and wondered whether you are “behind” for your age, ...