Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Protect Yourself from Invoice Impersonation

Tip of the Week: How to Protect Yourself from Invoice Impersonation

As cybercriminals become increasingly sophisticated in their methods of attack, it is important that your staff--the ones on the front lines--are educated to spot these attempts and know what to do if one is encountered. In order to spot these attacks, it is important to know what to look for.

Unfortunately, the increased sophistication of these attacks have made them harder to spot and resultantly, harder to avoid. This has led to a rise in the use of an attack vector known as an invoice impersonation attack. When utilizing these attacks, a cybercriminal will send a message under an assumed name (often one that belongs to a regular contact in actuality) that includes an invoice number and a link, presumably to download the invoice.

However, rather than downloading the invoice, as expected, the target of an attack will discover that they have actually downloaded some malware. This is often how ransomware is introduced into a system.

Warning Signs
To avoid falling victim to an invoice impersonation attack--or any form of email phishing or fraud--your users should know to keep their eyes out for any warning signs.

Messages containing a payment request and link
One of the bigger security issues with the concept of email is the fact that most users can only take it on good faith that the message comes from the person it appears to have. There is no voice to identify as someone else’s, and no handwriting to compare to the actual person’s.

Therefore, if an email comes from someone with a request for payments to be made, with a link to what is claimed to be a payment portal, don’t click. You might have just dodged a ransomware program delivered via a phishing attempt.

How to Protect Your Business (with the Help of Your Employees)
Phishing attacks, including invoice impersonation attacks, rely on their target to trust the content enough to not question if the sender is who they say they are. As such, they can be avoided with a little mindfulness on the part of your employees.

Make sure your employees know to keep an eye out for risk factors. Requiring regular training sessions as well as testing their cybersecurity mindfulness will help to keep awareness alive and well among your staff members.

Furthermore, you should have updated spam filters and malware blockers installed to help minimize the risk that these messages even make it to your staff in the first place. This is where Telesys Voice and Data can help.

If you’re interested in the solutions we have that can help make cyberthreats a non-issue, give us a call at (800) 588-4430.


No comments yet
Already Registered? Login Here
Wednesday, 20 February 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Business Computing Malware Privacy Business Productivity Email Hosted Solutions Microsoft Internet Software Windows 10 Backup Network Security Computer Managed Service Provider IT Services Ransomware Mobile Devices Innovation Android Smartphone Outsourced IT Hardware User Tips Google Managed IT services Social Media Productivity Browser IT Support Workplace Tips Business Continuity Data Backup Efficiency Communication Disaster Recovery Upgrade Data Small Business App Business Management Data Management Data Recovery Cloud Computing Smartphones Office Internet of Things Holiday Microsoft Office Windows Remote Monitoring Facebook Miscellaneous WiFi Network Server Office 365 Managed IT Services Artificial Intelligence Gmail Big Data Tech Term Spam Phishing Encryption Save Money Paperless Office Password Bandwidth Firewall Customer Relationship Management Apps Unified Threat Management Passwords Hosted Solution Recovery Robot Employer-Employee Relationship Customer Service Mobile Device Management Work/Life Balance Word Collaboration Saving Money Hacker VoIP Remote Computing Vendor Management Infrastructure Content Filtering Chrome Document Management Tip of the week communications Wi-Fi Office Tips How To Cybersecurity Apple Avoiding Downtime Government IT Support Money Risk Management The Internet of Things Computers IT Management Operating System Mobile Device File Sharing Antivirus Presentation Business Growth Project Management Education Managed IT Data loss BDR Cybercrime Compliance Outlook Alert Printing Data storage Windows 10 Telephone Systems Social Computing Downtime Website Applications Vulnerability Health Virtual Reality Data Security Two-factor Authentication Hacking Mobile Computing SaaS Settings BYOD Tech Support Analytics Budget End of Support Digital Payment Information Technology Augmented Reality Maintenance Mouse IBM Humor Running Cable Legal Analyitcs Bring Your Own Device Search Sports Twitter Politics Monitors Tablet IT service Travel Cortana Google Drive Virtualization Healthcare Business Technology Websites Automation Administration Specifications Physical Security Going Green Taxes Remote Monitoring and Management Botnet IT solutions Safety Regulations User Wireless Technology Samsung Wireless Retail Meetings Patch Management Storage Scam Best Practice Lithium-ion battery Smart Technology YouTube Identity Theft Business Owner Computer Care HIPAA Unified Communications Software as a Service Router VPN Mobile Security Marketing Training LiFi Virtual Private Network Assessment Automobile Server Management Upgrades Licensing Competition Laptop Hard Drives Web Server Cookies Mail Merge Update Break Fix Language Consultation Virtual Desktop Printer Geography Disaster Resistance Electronic Health Records Administrator Migration Statistics 3D Printing Black Friday Software Tips eWaste Halloween Refrigeration Cameras IT Sevices Nanotechnology Address Chromebook Dark Web Computing Infrastructure Network Congestion Access Control Cables Proactive IT Law Enforcement Cyberattacks Chatbots Bluetooth Unsupported Software Deep Learning Cyber Monday Fun Environment Scary Stories CCTV IoT Redundancy Emoji Data Warehousing Corporate Profile Alerts Quick Tips Display SharePoint Wires IT Consulting Gadget Bookmarks Identity Mobile Data flu season History Hacks Troubleshooting Undo Utility Computing Microsoft Excel WannaCry Cooperation Time Management Downloads IP Address MSP Data Breach Phone System Favorites Alt Codes Fort Worth Cabling Current Events Staffing G Suite Zero-Day Threat Processors Blockchain Proactive Technology Laws Staff Network Management Multi-Factor Security Mobile Office Conferencing Motion Sickness Typing flu shot Permissions VoIP Google Docs Buisness GPS Cost Management Backup and Disaster Recovery Lenovo Unified Threat Management Flexibility Touchscreen Writing Google Calendar Google Maps Employees Shortcut Personal Information Cryptocurrency Fort Worth IT Disaster Knowledge Fraud Digital Tracking IT Consultant Management Procurement Superfish WPA3 business communications systems Machine Learning Operations Social Engineering Legislation iPhone Social Networking Computer Repair Bitcoin DFW IT Service Uninterrupted Power Supply Experience Net Neutrality Spyware Cleaning Enterprise Resource Planning Remote Worker Notifications Fleet Tracking Internet Protocol Relocation Wearable Technology Webcam Motherboard Electronic Medical Records Windows 8 Solid State Drive Google Wallet Internet Exlporer How To Dark Data Domains Mobile Virtual Assistant Networking Crowdsourcing Asset Tracking VoIP streamlines Private Cloud Heating/Cooling 5G Entrepreneur Application Point of Sale Distributed Denial of Service Hard Disk Drive Drones Firefox Users Supercomputer Public Speaking Company Culture PowerPoint Remote Workers business network infrastructure Error IT Technicians Servers Technology Tips Help Desk Modem Managed IT Service Hotspot User Error IT Budget Consumers Vulnerabilities Techology Information data services Mirgation Comparison

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...