6 Sophisticated Phishing Email Examples and Why They’ll Trick You

By |2019-09-11T10:38:12-04:00September 11th, 2019|Cyber Security Awareness, Office 365 & G Suite, Uncategorized|

a hacker can infect your email account with ransomware in just seconds! Check it out:

Most cyber attacks happen through phishing attacks, so we compiled a list of the most sophisticated phishing emails we’ve come across:

Here’s 6 Sophisticated Phishing Emails and Why You’ll Fall For Them:

1. Google Sign-In Imitation Emails

Why This Will Trick You: Google is very secure, where they validate anytime your email was used to log in from a unknown device or unusual location. Most social media networks like Facebook, LinkedIn, Instagram, etc. also have this security feature as well, so most users have received an email like this every once in awhile. An attacker can send this fake email to you playing at the fact that you might be more cautious than others with your security. You’re baited into clicking the link for more details, and just like that, you’ve been compromised! How to Avoid Being Tricked: Cyber criminals can’t use Google’s actual email, so they’re most likely sending from a fake/dummy email address like noreply@googel.ITsecurity.net (I made that up on the spot). Always be sure to check the sending email address is actually from the expected source! It’s always important that you hover over any links before you click them. When you hover over a link, you’ll see the URL in the bottom left hand side of your display. It will show you the true destination that the link will send you. This email is very impersonal, meaning your name, account number, email, etc. aren’t anywhere in the email. Google will always include some personalization in their emails to prove their validity.

2. Charity Donation for You

Photo Credits Why This Will Trick You: Doris Buffett is a true philanthropist – so the email is not lying. There are several versions of this phishing email that gets sent around. The look and feel of the email suggest that it’s real. It plays off the human emotions of greed and gullibility, designed for you to click the link and engage with them in conversation. The link is tricky, because the hacker made it look like you could see the full link without hovering. Once you click the link, you’re taken to a malicious website. Responding to the email doesn’t cause immediate harm, but it will show the cyber criminal that you’re gullible and susceptible to well crafted phishing emails, and you can bet that you’ll receive much more in the future. How to Avoid Being Tricked: Like the first example, this phishing email is very impersonal (without even a salutation) and has very little information. A skeptic would ask: “Why did Doris Buffett pick me? What is her ‘large private foundation’ that they couldn’t specify?” Using the hovering trick over the link ‘Peggy’ provided, you’ll be sure to see a different URL than what it says it is.

3. Netflix’s Membership Reset

Photo Credits Why This Will Trick You: If you’re a regular user of Netflix (I certainly am), this will surely come as a shock, and you’ll most like click on one of the links in the email. This is email is also crafted like a smart marketing email – with a clear call to action that catches your attention and entices you to click on it. Really, it makes it seem so easy to restart your membership, like all you have to do is click. It’s not hard to imitate marketing emails from different companies, especially if you’ve seen the emails yourself. All it takes is a hacker to have bit of HTML experience, and they can craft phishing emails that look nearly identical to the company’s real emails. How to Avoid Being Tricked: When you get unexpected emails from company’s claiming that you’ve cancelled your subscription/membership, your account has been locked, etc., it’s always good to take into consideration the validity of the sender and any links before believing that it’s true. Emails like these are required by law to have a ‘Unsubscribe’ option. If you can’t find that option anywhere, chances are that it’s a scam trying to trick you.

4. Bonus Decrease From Your HR Department

Why It Will Trick You: Cyber criminals in this scenario are playing off the idea that the biggest news company’s have known for years: negativity sells. This means that you’re more likely to click on a link if it’s something negative, rather than positive. Everyone at the company would be disappointed to know that their bonuses are decreasing at the end of the year, especially if you thought the work you’ve been doing deserved more attention. Little research would be needed to personalize this email to your company’s HR director. A simple social media search, or even a browse through on your company’s website can give the hacker enough information to create a personalized plan of attack. How to Avoid Being Tricked: Social engineering attacks like this happen all the time. It’s so easy to impersonate one of your company’s employees simply by searching through your website or social media. A lot of time, company’s have their emails listed on their websites, which makes it extremely easy for a hacker to make a fake email address almost identical to it. When receiving a social engineering attack like this, make sure you always check the validity first. Give a call to the person the email is claiming to be. It’s so easy to be tricked in an email, and that’s why it’s always a good idea to check with the source directly.

5. New Company Benefits From Your HR Department

Why It Will Trick You: Who doesn’t love more benefits from your company? The cyber criminals know this and are using an employee’s excitement against them. Like the Netflix example above, this has a clear call to action button that is enticing to click. It’s clear what the email wants you to do: View Policy. It only takes one eager employee to click that blue button and infect all the computers on that network. How To Avoid Being Tricked: You’ve heard it several times throughout this article, because it’s such an important part of your safety: double check the sender’s email address, and hover over any links/buttons that are in the email. Realistically, if your HR department is emailing you about new policy changes, it’ll be sent to multiple people throughout your company or department. It’s easy to check with your next door neighbour and ask if they got the same thing as you did. It’s also possible that the cyber criminals sent a mass email to your whole company. In that this case, contact your HR department through a separate email thread asking about the new benefits.

6. New IT Policy Starting Next Month

Why It Will Trick You: This a well crafted social engineering phishing email. The cyber criminal did his research, knowing what the IT Director’s email signature would look like. The call to action links stands out, making it clear what the criminal is looking for you to do. Once you click the link, it’s possible you’ll be tricked into a signing a document without looking it over, downloading malicious software, or whatever the cyber criminal wishes. This email can be very well timed, because a due date is clear: you’ll have to review and sign the document before April. If an attacker is sending this out in the later days of March, they’ll be more inclined to rush in, to click any links and to sign documents without thinking about the potential risks. How To Tell It’s Phishing: Like many phishing emails, there are a bunch of spelling mistakes, and those are signs of a scan. Think: how many times do you re-read your work emails before sending them off, making sure there’s no spelling or grammatical mistakes? Cyber criminals tend to write with poor English. There are a lot of cases where hackers are sending phishing emails from foreign countries, where English may not be their first language. Other times, hackers are being sloppy, because they know that it only takes 1 person to fall for the scam. They don’t need to have perfect English if 1 person will fall for their mistake-full emails. Reviewing the grammar and spelling mistakes of an email is essential to validating the safety of an email.>

How to Be Prepared for a Cyber Attack – Capital One Gets Hacked

By |2019-08-07T15:14:34-04:00August 7th, 2019|Cyber Security Awareness, Dark Web Monitoring, Uncategorized|

Were you affected by the Capital One breach?

Capital One, the 10th largest bank in the United States, was recently the victim of an internet breach where the information of over 100 million people in the US and 6 million in Canada were exposed. Executives at Capital One states that they’ve addressed the problem, but the reality is that the damage is already done; the stolen data is already in the hands of cyber criminals.

Where does all this stolen data go?

The Dark Web! It’s only a matter of time that all this data starts getting sold over the dark web. The hacker or group of hackers responsible can make multi-million dollars through selling all this data.

If you own a Capital One credit card, and especially if you do online banking, it’s essential to check to see if you’ve been compromised with a free dark web scan.

My data has been stolen…what do I do? 

Get ready to change your passwords! It’s easier to change your password than wait to be told if you been compromised. Any accounts associated with Capital One, all passwords should be changed. We suggest you do this regularly, every three to five months with accounts that contain valuable information.

Use a password aggregator to help ensure your password is strong and unique. Scary statistics show that more than 80% of users reuse passwords which is a serious security vulnerability.

Enabling two-factor authentication can add an extra layer of security to your logins. This can help prevent scammers from gaining access to your accounts. The most common form of two-factor authentication is when an application texts you a one-time code that enables you to access your account.

When, not if, breaches happen to any big organization you use, you will be prepared for the backlash because you took the necessary step to stay ahead of all issues.

How prepared for a cyber attack are you?

What would happen if a hacker decided to launch a cyber attack against your business? Would they be successful? Would they easily gain access to your company’s sensitive information?

All companies are vulnerable when they get comfortable in their cyber security. The Capital One breach is officially the largest ever to impact a United States bank, but there is sure to be bigger breaches. For a bank to be hacked, it shows that even companies that are trusted and relied on every day to be secure with your information are open to being attacked.

How can a company so secure get hacked?

Paige Thompson has been accused of breaking into a Capital One server and gaining access to 140,000 Social Security numbers, 1 million Canadian Social Insurance numbers and 80,000 bank account numbers, in addition to people’s names, addresses, credit scores, credit limits, balances, and other information, according to the bank and the US Department of Justice[1]. The 33-year-old, who lives in Seattle, had previously worked as software engineer for Amazon Web Services, the cloud hosting company that Capital One was using.

It’s clear to see that one of the highest levels of cyber threat truly is internal, because they already have access to the information and understand what security measures are put in place.

When cyber threats happen, most people see the hacker as the stereotypical rebel in his dark basement with a black hoodie on. In reality, the criminal is most likely someone from inside the company. In 2016, IBM found that 60% of all attacks were carried out by insiders[2].

Cyber Security Awareness Training is very important! It protects you and your organization from disgruntled and careless employees. Whether you’re a business owner or employee, every single business day is as important as the last day. Without proper training and proactive monitoring, you put your credibility and the trust of your customers at risk.

>

E-Tech recognized as Leaders in Cyber Security Awareness Training in the 2019 Cyber Security Awards

By |2024-01-23T15:16:35-05:00July 17th, 2019|About Us, Awards, Uncategorized|

United Kingdom, 2019 – Acquisition International Magazine have announced the winners of the 2019 Cyber Security Awards. E-Tech has been recognized as Leaders in Cyber Security Awareness Training.

As the importance and reliance on digital technology rises among society, the need for a secure environment for this to take place also rises. This is where the importance of Cyber Security cannot go unnoticed, as it has recently been described as one of the fastest-growing industries across the globe and is a fundamental feature of all developing technology and software.

This is an exciting time as research predicts worldwide spending on Cyber Security will rise dramatically in the upcoming years. This is driven by companies and individual’s innovation and dedication to harden data protection and strive for success, without high standards of Cyber Security – many aspects of digitally based companies would struggle to function.

The Cyber Security Awards honour the companies that have gone above and beyond in this highly competitive sector. Commenting on the success of his deserving winners, Steve Simpson, Awards Coordinator, said: “Cyber Security is vital in today’s technology driven market, and as such we at Acquisition International Magazine are proud to be able to showcase the expertly-chosen selection of the best of the best from across the industry. I would like to take this opportunity to offer my congratulations and best wishes for the future.”

“We are really proud to be awarded ‘the Leaders in Cyber Security Awareness Training for Canada.’ We’ve put a lot of time & effort into perfecting our CSAT program,” said Sandra Viveiros, Office Manager at E-Tech. “We found that to be truly cyber secure in today’s ever-changing, technological world, we must continually train the end users. We are very proud of our CSAT team & this recognition is well deserved.”

Acquisition International prides itself on the validity of its awards and winners. The awards are given solely on merit and are awarded to commend those most deserving for their ingenuity and hard work, distinguishing them from their competitors and proving them worthy of recognition.

About E-Tech:

E-Tech was born in 1991 and has been providing system support and information technology consulting services to our clients since 2005. We attribute our strength and success to our close working relationship with each and every one of our clients – regardless of size. We design our services specifically to help our clients succeed in today’s complex business environment, keeping in mind our client’s goals, objectives, and bottom lines. Since our inception, we have been establishing a strong bond with small to medium businesses and not-for-profits by delivering cyber security protection, website hosting services, IT support solutions, and website design services.

About Acquisition International Magazine:

Acquisition International is a monthly magazine brought to you by AI Global Media Ltd, a publishing house that has reinvigorated corporate finance news and reporting. Its topical news articles make it a valued read, and this readability ensures that advertisers will benefit greatly from their investment. AI works alongside leading industry analysts to ensure we publish the most up-to-date figures and analysis. The magazine has a global circulation, which brings together all parties involved in deal making and, in an increasingly global deal market, we are uniquely positioned to reach the deal makers that matter.

5 Steps to Test Your Backup Recovery Plan

By |2019-06-13T10:00:21-04:00June 13th, 2019|Business Continuity Solutions, Uncategorized|

Businesses face many different threats everyday – but being prepared for the worst with an intelligent Business Continuity Solution will give you a sense of comfort. The future is unpredictable and unknown but having a plan in motion shows the proactive awareness and due diligence of your company.

Few companies can afford disruption to their services for a prolonged period. For the small to medium size businesses, a day to a week of downtime could be a death sentence for your business. For large companies and corporations, a day to a week of downtime can result in millions of dollars lost due to missed work, and that doesn’t include the possible legal repercussions of a data breach.

What would downtime cost your business? Find out here.

Considering that the 3 major cyber threats to companies are hardware or system failures, malware and ransomware, and human error, it becomes nearly impossible for a company to protect itself without a proper BCDR plan and significant cyber security awareness training.

Even the strongest and most prepared companies deal with disruptions, data breaches, delays and issues. Just since the start of 2019 Facebook exposed up to 600 million passwords, the Marriott hack exposed the passport numbers of more than 5 million people, and 5 million Google passwords were leaked.

Business continuity helps your company become resilient and safeguards all the interest of your customer and employees. This helps you to focus on what matters to you the most: providing the services that your companies are built on.

If the disruptions are well managed and tackled right away, the harm that has been done can be fixed. The smallest disruption mishandled wrongly can be costly in both the financial term and lost data.

Business continuity provides many different values to customers and managers. The good that it provides managers is for the worst moments that your business could face, showing that there’s a light at the end of the tunnel.

With unpredictable disasters, companies have put an emphasis on how fast the company can recover from the disruption. The real threat that effects companies in the 21st century are either manmade or natural, and these can have a disruption on your company with an unknown timeline of when they would return.

Great, you get the importance on why having a business continuity plan is essential for all business. Now it’s important to test your backup recovery plan to see if it’s up to par – and we broke it down into 5 steps:

STEP 1: Know the Backup Infrastructure

Before you get started on your backup recovery plan, evaluating the current backup infrastructure first can help greatly. This could include your systems’ backup servers, backup media and system storage components.

The objective of this assessment should be to consider how effective the existing infrastructure is in recovering affected data amid a network security breakdown or other disasters. Secondly, there also needs to be a focus on identifying critical data from non-critical ones and the storage capacity of the components. This will help determine the extent to which critical data can be backed up using existing storage capacity.

STEP 2: Conduct Capacity Planning

The aim here is to understand the gap between the existing and expected storage requirements and anticipate how storage requirements will grow over the next 6 to 12 months. It will also help to know how the organization seeks to scale its existing backup infrastructure to meet this growth and how many different types and number of backup clients will it involve.

STEP 3: Evaluate User Policies and Procedures

In this step, the company policies, requirements, and procedures need to be reviewed to decide best practice. This includes deciding on the optimal backup schedule so that all data is backed up automatically.  This could vary from organization to organization; however, it will essentially depend on the nature of data that requires back up. For example, some companies may require a daily backup of their customer account database especially if it is being updated regularly; others however, may only need a weekly or monthly backup.

STEP 4: Identify Resource Needs

This step is crucial to a successful backup recovery plan. Issues relating to financial constraints, organization infrastructure constraints and personnel constraints need to be taken into account. For example, in the case of personnel constraints, a CIO needs to ask whether their number of employees is sufficient to perform a backup recover operation and whether they have the required skill-set to perform such an important task.

More importantly, infrastructure constraints could involve adding more data center resources or a backup recovery system to store files and other data.

STEP 5: Test Your Backup and Recovery Plan

Once you have made the necessary actions to have a backup and recovery plan, run simulations to ensure it works well, helping you to be prepared in the wake of a real security breach or a disaster.

To test your backup recovery plan, it is important that backups on all critical data be performed and no areas or servers are excluded. Your staff members also need to be trained on how to shut down the applications and load them upon restarting.

Furthermore, the backup recovery plan should also be timed to assess the speed at which it can backup and store critical data. Knowing how responsive your backup process is can be critical in an emergency scenario.

E-Tech has Business Continuity Solutions to help its clients succeed in today’s complex business environment. You can evaluate Your Recovery Time and Recovery Point Objectives with our Recovery Time Calculator.

Feel free to Contact Us for more information.

>

Title

Go to Top