Search for anything.

Your search for: "" revealed the following:

Search...
CreativeTechs

Need Help?

206-682-4315

CreativeTechs
CreativeTechs
  • PARTNERS
  • REMOTE WORK
  • NEWS
  • RECYCLING PROGRAM
  • PRODUCTS WE LOVE
CreativeTechs
CreativeTechs

Your search for: "" revealed the following:

Search...

Your search for: "" revealed the following:

Search...
Recent Updates
  • How Concerned Should You Be About Cyberattacks? May 9, 2025
  • Passkeys are Better than Passwords—Here’s How to Use Them May 8, 2025
  • In Find My, You Can Now Share the Location of Lost Items May 6, 2025
  • How to create secure passwords May 5, 2025
  • Security Precautions to Take While Traveling May 1, 2025
  • Beware these common ‘malvertising’ attacks April 30, 2025
  • Google Search Results Are Not Necessarily Safe April 29, 2025
Get your Security Policy
Topics

Your search for: "" revealed the following:

Search...
Recent Posts
  • How Concerned Should You Be About Cyberattacks?
    May 09 2025
  • Passkeys are finally gaining mainstream traction, with support from Apple, Google, Microsoft, and numerous major websites. Find out why they’re more secure than passwords and how to start using them. | CreativeTechs.com
    Passkeys are Better than Passwords—Here's How to Use Them
    May 08 2025
  • In Find My, You Can Now Share the Location of Lost Items | CreativeTechs.com
    In Find My, You Can Now Share the Location of Lost Items
    May 06 2025
Tag
Apple Apple Blogs Article Backup CS4 events Flash free games Google halloween holiday HomeKit HomePod how icloud InDesign iOS iPad iPhone keynote Mac macOS mail media mode News papercraft password PDF Phishing Photography purchasing restart safe search security Siri terminal to Utilities video web design Wi-Fi Word

Wisdom Wednesday: The Importance of Training Your Employees to Spot Spoofed Emails

The number of security issues and malware risks that your company must contend with continues to grow every year, but one of the most potentially devastating threats that your business faces is surprisingly low-tech in nature. Spoofed emails don’t rely on complex ransomware or sophisticated keystroke loggers. Instead, your company’s bank account and sensitive information are at risk simply by your employees attempting to perform their job duties. Training your team to spot spoofed emails is key to avoiding falling victim to common scams.

CEO Fraud

What types of spoofed e-mail scams are out there?

Examples of two common types of spoofed email scams played out in recent weeks. The first, an instance of the CEO fraud, involved an Internet criminal passing himself off as the head of a small Kansas construction company. The fraudster pretended to be the CEO of Cornejo & Sons and emailed the finance department of Sedgwick County to request $566,000 in payment. Because the county actually owed the construction company money for services rendered, they submitted payment as directed–only to later find out that the payment request hadn’t come from Cornejo & Sons and the construction company never received any funds.

A similar scam aimed at a Wyoming hospital system sought to obtain employees’ W2 forms. In this case, the Internet fraudster posed as an internal executive at Campbell County Health and requested the W2 files for all staff from the hospital group’s finance department. The finance department complied, exposing the hospital’s 1,300 employees to potential tax return fraud.

Can you and your staff spot a spoofed e-mail?

No longer completely confident that your employees won’t fall victim to one of these commonly spoofed e-mail scams? Luckily, there are steps that you can take to train your staff to spot a spoofed e-mail. Conducting training sessions to alert your employees to the existence of such scams is an important first step. Putting in place internal practices to verify the veracity of any request before responding will also help your employees understand how to deal with any potential scam emails that your business receives.

However, some employees don’t understand the real threat that accompanies spoofed emails until they have actually been the recipient of a fake request. For this reason, some businesses choose to initiate a simulated attack to reveal to their employees firsthand how easy it is to become the victim of a spoofed email. Some services exist that make it easy to carry out a pretend to attack. Some of these services such as PhishMe allow you to target the attack to match the real threat each of your employees is likely to face, such as an email sent to marketing asking them to provide their SharePoint credentials. Experts assert that it is fundamental to follow any simulated attack with further training as your employees will be particularly receptive to in-depth lessons on avoiding spoofed emails after falling for your staged attack.

Concerned that your employees might be vulnerable to spoofed emails? The security experts at {company} can help you discover your business’ weak spots. Contact us today at {phone} or {email} to learn more.

Contact us today at {phone} or {email} to learn more.

Tim Pearson
April 26, 2017
0
Share:
help@creativetechs.com

206-682-4315

© 2024 The Mac Men LLC, DBA CreativeTechs Support.