How To Protect Yourself From Email Fraud Once and For All

How To Protect Yourself From Email Fraud Once and For All

Business Email Compromise (BEC) refers to fraudulent email messages sent by cybercriminals and rogue states to imitate the identity of another party or person in order to scam or defraud an individual or organization.?

The worldwide financial impact is huge. ?The US FBI reported more than $43 billion of international losses associated with BEC attacks between June 2016 and December 2021, with almost a quarter of a million victims so far. ?In addition to financial losses, adversaries attempt to steal valuable trade secrets and information through BEC.?It’s a very serious problem.?

Common sense is actually quite uncommon, and this sad reality is exploited by scammers. The psychology at play during these attacks works by taking advantage of one of the following three factors:?Situations where actions required that are just too good to be true. Exploiting the human desire that leads one person to trust another. Curiosity-inducing content and actions that result in more action, such as clicks or downloads.?

Police and experts have offered helpful advice that includes tightening accounting controls; using multi-factor authentication (which you absolutely should be doing); employing Identity-based anti-phishing controls; deploying Domain-based Message Authentication, Reporting and Conformance (DMARC); and phishing email awareness training.?

Bad actors send more than three-million malicious emails every minute. The fact is that even when you practice the best defensive measures and business email compromise training, it’s unrealistic to believe you won’t be a victim of at least one BEC attack.?

Deloitte reported that 91% of cyber-attacks begin with a phishing email message.?Think about that.?

So, how can we protect ourselves against this massive threat??

To me, it seems the answer is simple.?Stop using email for sensitive communications.??

One seamless, secure way of communicating is Nextcloud’s Solution for Ensuring Zero-Trust Document Collaboration.?As I wrote in my article, “…a Zero-Trust system trusts no user, device, or application. They all must be continuously authenticated, access-checked, and monitored…” and “…Nextcloud now offers data-sharing file protection that far exceeds that afforded by other Cloud providers. And at a much lower price point. Needless to say, VIBE-enabled Nextcloud has eliminated the complexity, cost, and operational frailty inherent in PKI…”.?

Organizations can white-label VIBE enabled Nextcloud and even expand the offering to include more services such as Nextcloud Talk to eliminate the use of external messaging services and video calls.?

One thing is certain, if we keep doing what we've been doing, we'll keep getting what we have been getting.?So, for heaven’s sake, let’s stop using email for sensitive communications.

要查看或添加评论,请登录

Bill M.的更多文章

  • Securing our Digital World: Why We Need to Authenticate Everything Now

    Securing our Digital World: Why We Need to Authenticate Everything Now

    This week, a fake image of an explosion at the US Pentagon, generated by an AI, surfaced online. Despite being fake…

    1 条评论
  • Circles of Trust

    Circles of Trust

    Trust is an essential element in today’s physical and digital worlds. Can you trust people and products to perform as…

    10 条评论
  • Nextcloud’s Solution for Ensuring Zero-Trust Document Collaboration

    Nextcloud’s Solution for Ensuring Zero-Trust Document Collaboration

    The world of cryptography and Cloud security is congested with buzzwords and promises of data privacy. The jargon and…

    3 条评论
  • It’s Time To Shake The Cybersecurity Etch A Sketch

    It’s Time To Shake The Cybersecurity Etch A Sketch

    In reflecting on the state of cybersecurity, and specifically the cryptography (authentication and/or encryption) used…

    18 条评论
  • The Mendoza Line...

    The Mendoza Line...

    Anybody who has ever been a fan of baseball is familiar with the Mendoza line. It’s an expression derived from Mario…

  • There’s a lesson in the rear-view mirror

    There’s a lesson in the rear-view mirror

    Picture this. You’re about to embark on a road trip and when you enter your vehicle you quickly realize that something…

  • Dear Mr. Zuckerberg

    Dear Mr. Zuckerberg

    MOST OF THIS ARTICLE WAS WRITTEN IN 2017, BUT NEVER PUBLISHED AS I JUDGED IT TO BE TOO PROMOTIONAL. HOWEVER, IN LIGHT…

  • Having Your Digital Cake and Eating It Too…

    Having Your Digital Cake and Eating It Too…

    Anybody who’s ever read the iconic MAD magazine would be familiar with the wordless Spy vs Spy cartoon. First published…

    12 条评论
  • You Can’t Get There From Here…

    You Can’t Get There From Here…

    No doubt many who read this article have heard the expression “You can’t get there from here…” It’s most often…

    12 条评论
  • The IoT Horse Has Bolted! Hurry! Shut the Barn Door!

    The IoT Horse Has Bolted! Hurry! Shut the Barn Door!

    Here’s an interesting statistic that I’d like you to consider. Smart Cities World estimates that there are now 31…

    2 条评论

社区洞察

其他会员也浏览了