Just as a good pickpocket can steal your belt without you feeling it, the latest computer hack is in danger of catching any business user with their pants down – and at first they won’t feel a thing.
That’s because this hack is invisible. It looks nothing like a hack at all, says Humber region IT systems and software supplier HBP Systems. Even the most sophisticated cyber security won’t stop it, and it succeeds because it preys on the weakest point in any computer system: the operator.
Every computer user now faces this most sophisticated form of phishing, and it’s as simple as it’s devastating, says HBP Systems Operations Director Tony Pearson.
How the scam works
Tony explains: “This is the most devious phishing hack yet. No cyber security system will stop it because, as far as the computer is concerned, it’s a genuine email from a trusted source. An email from a colleague will land in your email inbox with a request for you to follow a link to gain access to a file. Click on it, and you’ll be asked for some system log in details. Because you trust the sender, you fill in the log in fields, at which point you’ve passed that data to a criminal organisation.
“What’s more, the software will send similar emails to everyone in your database, repeating the process with their computer, and then the computers of everyone in their databases too.
“Nothing will happen at first; after all, it’s just some login details. But eventually those details could be used to distribute and plant ransomware on your system, or that of one of your contacts, and a new nightmare begins.”
How to defeat it
“None of the normal checks work. There will be no ‘dodgy’ email addresses or oddly-named links to spot. The email signature and sign-off will be perfect. None of the normal tell-tale signs that people ought to be looking out for will be there.
“But it’s a question of applying due diligence; of being suspicious. Ask yourself: ‘Why is this person sending me an email?’ ‘Am I expecting a file?’ ‘Why didn’t they say something about this earlier; we were in a meeting together an hour ago?’
“If you weren’t expecting an emailed file, even though it doesn’t look ‘wrong’, pick up the phone and ask the sender if the message is genuine. They’ll tell you at once, and you’ll be able to deal with it accordingly. And don’t forward it to anyone. The person you send it to might not be as vigilant as you,” he added.
www.hbpsystems.co.uk
Scroll down to read more articles like this which have been published recently on this blog
You can also read additional current and archived articles on our dedicated magazine website
Low Cost and Free Publicity - Your company can easily benefit from some publicity like this in return for a contribution towards our layout costs (£55 to £75 plus VAT), payable in advance via PayPal or credit card or receive the service absolutely free of charge if you advertise (see below).
We post articles up to twice a day and never delete them - we only archive them each year so that they continue to remain visible to search engines.
To have your story published - just send us your news item, logo and image(s) and we will review the material, make any necessary changes to the wording / wordcount and then advise you when it will be published.
If you are a regular advertiser placing series bookings or subscribing to our VIP Packages in our printed and online publications, you will qualify for a specific number of free postings on this blog while you continue to advertise with us.
Also, if you purchase one of our Online and Print Combo packages, Featured Articles or Advertorial packages, posting on this blog is included in the price.
For details and rates for all of our advertising options in print and online, download our media pack contact us or visit our website.
Door Industry Journal is a trading style of Avalon Innovations LLP Company Registration No. 06807833
No comments:
Post a Comment