Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Protect Yourself from Invoice Impersonation

Tip of the Week: How to Protect Yourself from Invoice Impersonation

As cybercriminals become increasingly sophisticated in their methods of attack, it is important that your staff--the ones on the front lines--are educated to spot these attempts and know what to do if one is encountered. In order to spot these attacks, it is important to know what to look for.

Unfortunately, the increased sophistication of these attacks have made them harder to spot and resultantly, harder to avoid. This has led to a rise in the use of an attack vector known as an invoice impersonation attack. When utilizing these attacks, a cybercriminal will send a message under an assumed name (often one that belongs to a regular contact in actuality) that includes an invoice number and a link, presumably to download the invoice.

However, rather than downloading the invoice, as expected, the target of an attack will discover that they have actually downloaded some malware. This is often how ransomware is introduced into a system.

Warning Signs
To avoid falling victim to an invoice impersonation attack--or any form of email phishing or fraud--your users should know to keep their eyes out for any warning signs.

Messages containing a payment request and link
One of the bigger security issues with the concept of email is the fact that most users can only take it on good faith that the message comes from the person it appears to have. There is no voice to identify as someone else’s, and no handwriting to compare to the actual person’s.

Therefore, if an email comes from someone with a request for payments to be made, with a link to what is claimed to be a payment portal, don’t click. You might have just dodged a ransomware program delivered via a phishing attempt.

How to Protect Your Business (with the Help of Your Employees)
Phishing attacks, including invoice impersonation attacks, rely on their target to trust the content enough to not question if the sender is who they say they are. As such, they can be avoided with a little mindfulness on the part of your employees.

Make sure your employees know to keep an eye out for risk factors. Requiring regular training sessions as well as testing their cybersecurity mindfulness will help to keep awareness alive and well among your staff members.

Furthermore, you should have updated spam filters and malware blockers installed to help minimize the risk that these messages even make it to your staff in the first place. This is where Telesys Voice and Data can help.

If you’re interested in the solutions we have that can help make cyberthreats a non-issue, give us a call at (800) 588-4430.


No comments yet
Already Registered? Login Here
Friday, 16 November 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Malware Business Computing Privacy Productivity Email Business Microsoft Internet Hosted Solutions Software Windows 10 Managed Service Provider Backup Computer Ransomware IT Services Network Security Mobile Devices Android Smartphone Managed IT services User Tips Social Media Outsourced IT Hardware Google Browser IT Support Workplace Tips Efficiency Communication Innovation Disaster Recovery Business Continuity Data Backup Data Data Management App Business Management Smartphones Small Business Office Upgrade Productivity Cloud Computing Holiday Network Windows Internet of Things Facebook Remote Monitoring Data Recovery Miscellaneous WiFi Server Office 365 Microsoft Office Artificial Intelligence Gmail Big Data Tech Term Phishing Encryption Spam Unified Threat Management Bandwidth Firewall Password Robot Apps Save Money Paperless Office Hosted Solution Recovery Customer Relationship Management Avoiding Downtime Word Hacker Customer Service Managed IT Services Mobile Device Management How To Content Filtering Government Saving Money Remote Computing Money Work/Life Balance Infrastructure Wi-Fi Office Tips Passwords Chrome Employer-Employee Relationship Document Management Tip of the week Risk Management Cybersecurity Apple Computers Alert Data Security Hacking IT Support Mobile Computing Data storage Tech Support Computing Compliance Education Operating System IT Management Cybercrime Virtual Reality Mobile Device Antivirus VoIP Project Management Presentation Business Growth SaaS BYOD Applications Social Managed IT Data loss BDR Website Outlook Telephone Systems Windows 10 File Sharing Two-factor Authentication Settings Analytics Vendor Management Health The Internet of Things VPN Physical Security Augmented Reality Going Green Marketing Taxes Botnet IBM Running Cable Printing Virtual Private Network Samsung Assessment Competition Server Management Licensing Search Meetings Healthcare Bring Your Own Device Digital Payment Sports Storage IT service Information Technology Cortana Maintenance Virtualization Humor Computer Care Regulations Administration Analyitcs Training IT solutions Safety Tablet Wireless Technology Automobile Upgrades Smart Technology Wireless Budget Business Technology HIPAA Downtime End of Support Specifications Router communications Mouse Mobile Security YouTube User Collaboration Unified Communications Legal Patch Management Retail LiFi Scam Twitter Best Practice Politics Monitors Lithium-ion battery Vulnerability Travel Identity Theft Google Drive Business Owner Websites Automation Motion Sickness Hard Disk Drive IoT Data Warehousing Supercomputer Alerts Halloween Google Docs SharePoint Refrigeration Firefox MSP Servers Conferencing PowerPoint Help Desk Identity Writing flu season business network infrastructure Fun Utility Computing Deep Learning Personal Information Microsoft Excel IT Budget Cooperation Scary Stories Downloads Techology Consumers IT Consultant Proactive Machine Learning Social Engineering Fort Worth data services Mail Merge Computer Repair Blockchain Notifications Staff Multi-Factor Security Undo Disaster Resistance Cleaning Consultation Remote Monitoring and Management eWaste Statistics Relocation Software Tips flu shot IP Address Google Wallet Address Webcam Cost Management IT Sevices Alt Codes Electronic Medical Records Permissions Crowdsourcing Flexibility Dark Data Google Calendar Proactive IT WPA3 Environment Bluetooth Private Cloud Fort Worth IT Mobile Office Drones Redundancy Point of Sale Corporate Profile Management Typing Fraud Operations Buisness Legislation IT Consulting Quick Tips Fleet Tracking Troubleshooting Error History Social Networking DFW IT Service Knowledge WannaCry Enterprise Resource Planning Cryptocurrency Net Neutrality Wearable Technology Data Breach Time Management Asset Tracking Phone System Cabling Motherboard Experience Web Server Mobile Bitcoin Update Staffing Internet Exlporer Software as a Service Technology Laws Network Management Remote Workers Administrator 3D Printing Distributed Denial of Service Lenovo Cameras VoIP Vulnerabilities Windows 8 Chromebook GPS Electronic Health Records Law Enforcement Google Maps IT Technicians Network Congestion Technology Tips Domains Unified Threat Management Touchscreen Entrepreneur Shortcut Disaster Modem Unsupported Software Managed IT Service 5G Hotspot User Error Application Superfish CCTV Digital Geography Emoji Tracking Cyberattacks Gadget Mirgation Users Display Comparison Public Speaking business communications systems iPhone Uninterrupted Power Supply Cookies Mobile Data Break Fix Hacks Language Printer Spyware Cables Bookmarks Migration Black Friday Internet Protocol Solid State Drive Nanotechnology Dark Web Current Events Computing Infrastructure Laptop Access Control Hard Drives Networking G Suite How To Wires Processors Heating/Cooling Favorites Chatbots Virtual Desktop Cyber Monday VoIP streamlines

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...