The Times Australia
The Times Technology News

.

Business email compromise attacks are on the rise

  • Written by NordLocker

Expert shares 5 simple steps to combat email threats every business should consider following

There’s an astounding 84% increase in business email compromise attacks, according to the latest Email Threat Report, which compares half-yearly statistics. The news should be particularly alarming to organizations that use email services as their main means of internal communication or correspondence with their partners and clients.

“Today, cybercriminals use highly sophisticated strategies to trick their victims into revealing sensitive information, sending money, or even giving access to their employer’s computer systems,” says Oliver Noble, a cybersecurity expert at NordLocker, an encrypted cloud storage service provider. “One of the most dangerous cyber threats to a business is social engineering, which occurs when hackers exploit human psychology to gain benefit. Unluckily, human error remains the most common reason for cybersecurity breaches.”

Data breach is one email apart

For irreparable damage to happen, a business needs just one well-constructed email to be opened and acted on by a vulnerable employee.

“The overwhelming amount of online communication has been causing many employees to be more distracted and less cautious about which emails they open and which links they click on,”  explains Oliver Noble. “Business email compromise attacks usually impersonate a trusted colleague or even the head of a company, a partner, or a well-known service provider to convince a recipient to engage in actions such as revealing confidential data, paying fake invoices, giving away their login credentials on a bogus webpage, or deploying malicious software, such as ransomware, on the victim's infrastructure.”

To avoid the doomsday scenario, Noble provides five easy-to-follow tips that can help protect your business from falling victim to email attacks.

5 steps to mitigate the risks of business email compromise

  • * Secure your email by training your staff to identify signs of malware, especially when an email contains attachments or links.
  • * Use spam filters. In recent years, email platforms have established filtering systems that are advanced in detecting unwanted emails. Even though they are not perfect, spam filters do a good job of screening out suspicious messages.
  • * Implement a secure file-sharing process. Despite being unsafe, email is still the most common means for file sharing. An encrypted cloud solution may be the most secure solution for sharing your sensitive files among colleagues and with third parties.
  • * Make sure your employees use strong, unique passwords to connect to your systems. Better yet, start using password managers and multi-factor authentication.
  • * Adopt zero-trust network access, meaning that every request for access to digital resources by a member of staff should be granted only after their identity has been appropriately verified.
     

ABOUT NORDLOCKER

NordLocker is the world’s first end-to-end encrypted cloud with a file encryption tool. It was created by the cybersecurity experts behind NordVPN – one of the most advanced VPN service providers on the market. NordLocker is available on various platforms, supports all file types, offers a fast and intuitive interface, and guarantees secure sync between devices. With NordLocker, files are protected from hacking, surveillance, and data collection. For more information: nordlocker.com.

Times Magazine

Building an AI-First Culture in Your Company

AI isn't just something to think about anymore - it's becoming part of how we live and work, whether we like it or not. At the office, it definitely helps us move faster. But here's the thing: just using tools like ChatGPT or plugging AI into your wo...

Data Management Isn't Just About Tech—Here’s Why It’s a Human Problem Too

Photo by Kevin Kuby Manuel O. Diaz Jr.We live in a world drowning in data. Every click, swipe, medical scan, and financial transaction generates information, so much that managing it all has become one of the biggest challenges of our digital age. Bu...

Headless CMS in Digital Twins and 3D Product Experiences

Image by freepik As the metaverse becomes more advanced and accessible, it's clear that multiple sectors will use digital twins and 3D product experiences to visualize, connect, and streamline efforts better. A digital twin is a virtual replica of ...

The Decline of Hyper-Casual: How Mid-Core Mobile Games Took Over in 2025

In recent years, the mobile gaming landscape has undergone a significant transformation, with mid-core mobile games emerging as the dominant force in app stores by 2025. This shift is underpinned by changing user habits and evolving monetization tr...

Understanding ITIL 4 and PRINCE2 Project Management Synergy

Key Highlights ITIL 4 focuses on IT service management, emphasising continual improvement and value creation through modern digital transformation approaches. PRINCE2 project management supports systematic planning and execution of projects wit...

What AI Adoption Means for the Future of Workplace Risk Management

Image by freepik As industrial operations become more complex and fast-paced, the risks faced by workers and employers alike continue to grow. Traditional safety models—reliant on manual oversight, reactive investigations, and standardised checklist...

The Times Features

Ricoh Launches IM C401F A4 Colour MFP to Boost Speed and Security in Hybrid Workplaces

Ricoh, a leading provider of smart workplace technology, today launched the RICOH IM C401F, an enterprise-grade A4 colour desktop multifunction printer (MFP) designed for Austral...

Why Diversification Still Matters in a Volatile Economy

Market volatility, geopolitical conflicts, inflation fears—these are only some of the wild cards that render the current financial environment a tightrope to walk. Amidst all thi...

Specialised nutrition gains momentum in supporting those living with early Alzheimer's disease

With high public interest in Alzheimer’s disease, there is growing awareness of the important role nutrition plays in supporting memory and cognitive function in people diagnosed...

From clinics to comfort: how sleep retreats are redefining care in Australia

Australia is amid a sleep health crisis. Nearly 40% of adults report inadequate sleep, and the consequences are far-reaching, impacting everything from cardiovascular health to...

Is our mental health determined by where we live – or is it the other way round? New research sheds more light

Ever felt like where you live is having an impact on your mental health? Turns out, you’re not imagining things. Our new analysis[1] of eight years of data from the New Zeal...

Going Off the Beaten Path? Here's How to Power Up Without the Grid

There’s something incredibly freeing about heading off the beaten path. No traffic, no crowded campsites, no glowing screens in every direction — just you, the landscape, and the...