Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Protect Yourself from Invoice Impersonation

Tip of the Week: How to Protect Yourself from Invoice Impersonation

As cybercriminals become increasingly sophisticated in their methods of attack, it is important that your staff--the ones on the front lines--are educated to spot these attempts and know what to do if one is encountered. In order to spot these attacks, it is important to know what to look for.

Unfortunately, the increased sophistication of these attacks have made them harder to spot and resultantly, harder to avoid. This has led to a rise in the use of an attack vector known as an invoice impersonation attack. When utilizing these attacks, a cybercriminal will send a message under an assumed name (often one that belongs to a regular contact in actuality) that includes an invoice number and a link, presumably to download the invoice.

However, rather than downloading the invoice, as expected, the target of an attack will discover that they have actually downloaded some malware. This is often how ransomware is introduced into a system.

Warning Signs
To avoid falling victim to an invoice impersonation attack--or any form of email phishing or fraud--your users should know to keep their eyes out for any warning signs.

Messages containing a payment request and link
One of the bigger security issues with the concept of email is the fact that most users can only take it on good faith that the message comes from the person it appears to have. There is no voice to identify as someone else’s, and no handwriting to compare to the actual person’s.

Therefore, if an email comes from someone with a request for payments to be made, with a link to what is claimed to be a payment portal, don’t click. You might have just dodged a ransomware program delivered via a phishing attempt.

How to Protect Your Business (with the Help of Your Employees)
Phishing attacks, including invoice impersonation attacks, rely on their target to trust the content enough to not question if the sender is who they say they are. As such, they can be avoided with a little mindfulness on the part of your employees.

Make sure your employees know to keep an eye out for risk factors. Requiring regular training sessions as well as testing their cybersecurity mindfulness will help to keep awareness alive and well among your staff members.

Furthermore, you should have updated spam filters and malware blockers installed to help minimize the risk that these messages even make it to your staff in the first place. This is where Telesys Voice and Data can help.

If you’re interested in the solutions we have that can help make cyberthreats a non-issue, give us a call at (800) 588-4430.


No comments yet
Already Registered? Login Here
Thursday, 22 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Privacy Productivity Malware Business Computing Business Email Microsoft Internet Windows 10 Backup Software Hosted Solutions IT Services Computer Network Security Managed Service Provider Android Smartphone Ransomware User Tips Google Mobile Devices Workplace Tips IT Support Hardware Efficiency Browser Communication Social Media Managed IT services Business Continuity Smartphones Disaster Recovery Outsourced IT App Office Holiday Data Innovation Small Business Facebook Business Management Remote Monitoring Upgrade Miscellaneous WiFi Office 365 Microsoft Office Windows Data Management Encryption Server Network Gmail Big Data Data Backup Internet of Things Data Recovery Apps Phishing Hosted Solution Recovery Spam Cloud Computing Artificial Intelligence Firewall Robot Password Content Filtering Work/Life Balance Tip of the week Office Tips Productivity Chrome Employer-Employee Relationship Cybersecurity Risk Management Unified Threat Management Apple Avoiding Downtime Word Hacker Customer Service Mobile Device Management How To Save Money Money Paperless Office Saving Money VoIP Remote Computing Presentation Business Growth Social Windows 10 Customer Relationship Management Wi-Fi Telephone Systems Outlook Applications Document Management Passwords Vendor Management Data Security Two-factor Authentication Settings IT Support Analytics Alert Health Managed IT Services The Internet of Things Computers Data storage Computing Hacking Tech Support Bandwidth Antivirus Education Virtual Reality Government Operating System Managed IT SaaS Cybercrime BYOD Tablet Automobile Infrastructure Upgrades Analyitcs Budget IT solutions Safety End of Support Wireless Technology Mouse Wireless Downtime Collaboration Website Specifications Legal Scam communications Vulnerability YouTube File Sharing User Unified Communications Twitter Politics Monitors Travel Google Drive Retail HIPAA LiFi Websites Automation Best Practice Virtual Private Network Mobile Security Physical Security Going Green Lithium-ion battery Taxes Server Management Botnet Business Owner Printing Samsung Augmented Reality Licensing Marketing Maintenance IBM Running Cable Digital Payment Mobile Computing IT Management Competition Bring Your Own Device Computer Care Search Sports Information Technology Project Management IT service Mobile Device Training Cortana Virtualization Humor Business Technology Administration Data loss Technology Laws Typing Network Management Fort Worth Blockchain Buisness Troubleshooting Lenovo Staff Web Server VoIP Multi-Factor Security Update Staffing BDR Unified Threat Management Cryptocurrency Touchscreen flu shot Knowledge Shortcut Permissions Administrator Disaster 3D Printing Phone System Superfish Flexibility Cameras Digital Google Calendar Chromebook GPS Law Enforcement Google Maps Network Congestion business communications systems Bitcoin Fort Worth IT Experience Patch Management Fraud Uninterrupted Power Supply Unsupported Software Operations CCTV Spyware Legislation Emoji Tracking Gadget Display Internet Protocol Windows 8 DFW IT Service Net Neutrality Solid State Drive Domains Mobile Data Hacks Networking Wearable Technology How To 5G Entrepreneur Application VoIP streamlines Heating/Cooling Smart Technology VPN Internet Exlporer Users Hard Disk Drive Public Speaking Current Events iPhone G Suite Firefox Software as a Service Processors Identity Theft Servers Distributed Denial of Service business network infrastructure Motion Sickness Supercomputer Google Docs Techology IT Technicians Assessment Technology Tips Managed IT Service Laptop Help Desk Hard Drives Writing data services Mail Merge Hotspot Virtual Desktop Personal Information IT Budget Disaster Resistance Mirgation IT Consultant Consultation Comparison Statistics Break Fix Halloween Machine Learning Refrigeration Social Engineering User Error PowerPoint Address Language Meetings Printer Computer Repair Notifications Storage Proactive IT Deep Learning Cleaning Black Friday Fun Bluetooth Dark Web Scary Stories Relocation Software Tips Consumers Google Wallet Redundancy Computing Infrastructure Webcam Corporate Profile Access Control Electronic Medical Records Crowdsourcing Dark Data IT Consulting Quick Tips Cyber Monday Data Warehousing Private Cloud Undo eWaste Drones Alerts Point of Sale WannaCry SharePoint IP Address Data Breach Alt Codes IT Sevices Time Management flu season Microsoft Excel Error Cabling Environment Cooperation Downloads Mobile Office

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...