Has this happened to you recently: You get an email from yourself asking you to click a link to see an agenda you didn’t write or for an invoice you never sent? The newest are people sending you pictures of checks that they supposedly put in the mail to you (hoping you click on the image which then makes nefarious things happen). Earlier this week I saw an email from myself with an exact duplicate of my own RPost signature asking me to click a link to register for a long-past webinar and download a strange document that was titled, “PO#09162020.doc”.
As 2020 plods along, new tech challenges I never thought we’d face are becoming realities. First of all, as I’m sure many of you who share living spaces have noticed, home internet connections have become less than ideal during the 8AM – 12 noon timeframe. My kids’ virtual learning via video hogs so much bandwidth that my own video calls for business are cutting out (fortunately, virtual school is only half a day).
It was only a matter of time. Fresh off their latest exploits at trying to phish for sensitive financial account information, scammers have set their sights on people’s actual jobs. With jobless claims now topping 30 million and the unemployment rate headed for new highs, cyber criminals now have fertile ground for a brazen new scam.
If you have money, savvy phisherman and whalers will find you. With most of the world hunkered down working from home, normal processes are disrupted, so this is a target-rich environment for scammers. They are lurking. Beware!
Killer whales occasionally hunt sharks. When they do, it can be ugly. In a recent whaling attack (This is not a nature article. We are referring to the very tricky type of email “spear-phishing” impostor email attack), the poser sent an email to one of the most famous sharks (from the Shark Tank TV show); an email with an invoice for a real estate renovation.
Apple, Google and Amazon have adapted extremely complex technology to the consumer world; and have forever changed the perception of what is possible with technology.
Autumn May Bring Digital Serenity with Security Autumnation.
Over the last year, while the user experience for technology has been progressively becoming simpler, the jobs of the business owner, IT director, and privacy and compliance officers have been progressively becoming more complex. Far more complex.
Many, many software service sales professionals throw around security phrases to make cyber security sound simple. Today, as technologies advance and threats get ever more sophisticated, encrypting email for privacy compliance is not getting simpler. The devil (hacker) is in the details.