The Times Australia
The Times Technology News

.

Business email compromise attacks are on the rise

  • Written by NordLocker

Expert shares 5 simple steps to combat email threats every business should consider following

There’s an astounding 84% increase in business email compromise attacks, according to the latest Email Threat Report, which compares half-yearly statistics. The news should be particularly alarming to organizations that use email services as their main means of internal communication or correspondence with their partners and clients.

“Today, cybercriminals use highly sophisticated strategies to trick their victims into revealing sensitive information, sending money, or even giving access to their employer’s computer systems,” says Oliver Noble, a cybersecurity expert at NordLocker, an encrypted cloud storage service provider. “One of the most dangerous cyber threats to a business is social engineering, which occurs when hackers exploit human psychology to gain benefit. Unluckily, human error remains the most common reason for cybersecurity breaches.”

Data breach is one email apart

For irreparable damage to happen, a business needs just one well-constructed email to be opened and acted on by a vulnerable employee.

“The overwhelming amount of online communication has been causing many employees to be more distracted and less cautious about which emails they open and which links they click on,”  explains Oliver Noble. “Business email compromise attacks usually impersonate a trusted colleague or even the head of a company, a partner, or a well-known service provider to convince a recipient to engage in actions such as revealing confidential data, paying fake invoices, giving away their login credentials on a bogus webpage, or deploying malicious software, such as ransomware, on the victim's infrastructure.”

To avoid the doomsday scenario, Noble provides five easy-to-follow tips that can help protect your business from falling victim to email attacks.

5 steps to mitigate the risks of business email compromise

  • * Secure your email by training your staff to identify signs of malware, especially when an email contains attachments or links.
  • * Use spam filters. In recent years, email platforms have established filtering systems that are advanced in detecting unwanted emails. Even though they are not perfect, spam filters do a good job of screening out suspicious messages.
  • * Implement a secure file-sharing process. Despite being unsafe, email is still the most common means for file sharing. An encrypted cloud solution may be the most secure solution for sharing your sensitive files among colleagues and with third parties.
  • * Make sure your employees use strong, unique passwords to connect to your systems. Better yet, start using password managers and multi-factor authentication.
  • * Adopt zero-trust network access, meaning that every request for access to digital resources by a member of staff should be granted only after their identity has been appropriately verified.
     

ABOUT NORDLOCKER

NordLocker is the world’s first end-to-end encrypted cloud with a file encryption tool. It was created by the cybersecurity experts behind NordVPN – one of the most advanced VPN service providers on the market. NordLocker is available on various platforms, supports all file types, offers a fast and intuitive interface, and guarantees secure sync between devices. With NordLocker, files are protected from hacking, surveillance, and data collection. For more information: nordlocker.com.

Times Magazine

Building a Strong Online Presence with Katoomba Web Design

Katoomba web design is more than just creating a website that looks good—it’s about building an online presence that reflects your brand, engages your audience, and drives results. For local businesses in the Blue Mountains, a well-designed website a...

September Sunset Polo

International Polo Tour To Bridge Historic Sport, Life-Changing Philanthropy, and Breath-Taking Beauty On Saturday, September 6th, history will be made as the International Polo Tour (IPT), a sports leader headquartered here in South Florida...

5 Ways Microsoft Fabric Simplifies Your Data Analytics Workflow

In today's data-driven world, businesses are constantly seeking ways to streamline their data analytics processes. The sheer volume and complexity of data can be overwhelming, often leading to bottlenecks and inefficiencies. Enter the innovative da...

7 Questions to Ask Before You Sign IT Support Companies in Sydney

Choosing an IT partner can feel like buying an insurance policy you hope you never need. The right choice keeps your team productive, your data safe, and your budget predictable. The wrong choice shows up as slow tickets, surprise bills, and risky sh...

Choosing the Right Legal Aid Lawyer in Sutherland Shire: Key Considerations

Legal aid services play an essential role in ensuring access to justice for all. For people in the Sutherland Shire who may not have the financial means to pay for private legal assistance, legal aid ensures that everyone has access to representa...

Watercolor vs. Oil vs. Digital: Which Medium Fits Your Pet's Personality?

When it comes to immortalizing your pet’s unique personality in art, choosing the right medium is essential. Each artistic medium, whether watercolor, oil, or digital, has distinct qualities that can bring out the spirit of your furry friend in dif...

The Times Features

How much money do you need to be happy? Here’s what the research says

Over the next decade, Elon Musk could become the world’s first trillionaire[1]. The Tesla board recently proposed a US$1 trillion (A$1.5 trillion) compensation plan, if Musk ca...

NSW has a new fashion sector strategy – but a sustainable industry needs a federally legislated response

The New South Wales government recently announced the launch of the NSW Fashion Sector Strategy, 2025–28[1]. The strategy, developed in partnership with the Australian Fashion ...

From Garden to Gift: Why Roses Make the Perfect Present

Think back to the last time you gave or received flowers. Chances are, roses were part of the bunch, or maybe they were the whole bunch.   Roses tend to leave an impression. Even ...

Do I have insomnia? 5 reasons why you might not

Even a single night of sleep trouble can feel distressing and lonely. You toss and turn, stare at the ceiling, and wonder how you’ll cope tomorrow. No wonder many people star...

Wedding Photography Trends You Need to Know (Before You Regret Your Album)

Your wedding album should be a timeless keepsake, not something you cringe at years later. Trends may come and go, but choosing the right wedding photography approach ensures your ...

Can you say no to your doctor using an AI scribe?

Doctors’ offices were once private. But increasingly, artificial intelligence (AI) scribes (also known as digital scribes) are listening in. These tools can record and trans...