Avoid Becoming a Victim of Email Spoofing – one of the most common ways the bad guys look to gain access to your sensitive information is via phishing or email spoofing.
How is email spoofing done?
The email may look like it’s coming from someone you know, when it in reality is not. It is important to take a close look at the email address and the content of the message. For example, the cybercriminal may ask you to :
–Â Â Â Â Â Â Â Â Â Â Provide personal information or financial information
–Â Â Â Â Â Â Â Â Â Â Send intellectual property
–Â Â Â Â Â Â Â Â Â Â Transfer or wire funds
–Â Â Â Â Â Â Â Â Â Â Provide some type of login information
–Â Â Â Â Â Â Â Â Â Â Download a file
–Â Â Â Â Â Â Â Â Â Â Click on a link or open an attachment
This type of phishing can be tough to identify if employees regularly transmit sensitive information over email.  Even if you are expecting an email asking you to provide sensitive information, it is best practice for companies to have a confirmation plan. For example, employees can call the individual on the phone to confirm the date and time of the email sent, and that it is legitimate.
Why is email spoofing important?
Â
Email spoofing has the ability to compromise not only your sensitive information, but your company’s entire network and any other devices your computer/phone/tablet may be connected to. Once the cybercriminals have a way in to your network, they may leave you alone or let their virus remain dormant for days or even weeks before attacking. Once an attack happens, it can cripple a company’s ability to conduct business for days until files are restored or unlocked. If a cybercriminal succeeds in convincing an employee to transfer funds, it may cost a company thousands of dollars that cannot be reclaimed.
What can you do about email spoofing?
–Â Â Â Â Â Â Â Â Â Â Educate employees about the dangers of email spoofing, and how to identify email spoofing.
–Â Â Â Â Â Â Â Â Â Â Institute procedures on how to electronically transmit sensitive information.
–Â Â Â Â Â Â Â Â Â Â Form a plan on what to do if the company network is compromised.
–          Lean on the IT department to install and maintain spam and malware filters for the company’s email platform. Some services, such as Teoma Secure, can identify and quarantine malicious emails before they hit employees’ inboxes.
Do you have questions on any of the above? Are there any initiatives you want to discuss further? Email sales@teomasystems.com or call 248-614-6600.Â
Located in Troy and founded in 1993 Teoma Systems is a local leader in providing best in class IT solutions from industry leaders. All Teoma Systems solutions are engineered and supported by local Teoma Systems employees. Teoma’s technical staff averages over fifteen years of industry experience and ten years employment with Teoma. Attracting and retaining such a skilled staff requires providing associates an environment that rewards creativity, teamwork, and personal development.
Managed Services – Phone Systems – Carrier Services – Data Networking – Wi-Fi – Video Surveillance – Low Voltage Cabling – Cloud Services – IT Services – IT Staff Augmentation – Voice – Firewalls – Cybersecurity – Help Desk Support – Cost Containment – SDWAN