Search
Generic filters
Exact matches only
Filter by Custom Post Type

Gone Phishing: How to Recognise Scam Emails and Protect Yourself Online


Last year scammers stole £1.2bn from the British public. Their favourite tactic: taking over your email account.

So our Internet Security team have compiled some expert guidance to help you avoid joining those alarming statistics.

3067, 3067, Hacker, Hacker-Using-2-computers.jpg, 256951, https://www.linten.co.uk/wp-content/uploads/2019/07/Hacker-Using-2-computers.jpg, https://www.linten.co.uk/blog/gone-phishing-how-to-recognise-scam-emails-and-protect-yourself-online/hacker-using-2-computers/, Man using two laptops simultaneously, 10, , , hacker-using-2-computers, inherit, 3066, 2019-07-23 16:06:36, 2019-07-23 16:06:53, 0, image/jpeg, image, jpeg, https://www.linten.co.uk/wp-includes/images/media/default.png, 1920, 1280, Array

Gone Phishing: How to Recognise Scam Emails and Protect Yourself Online


Last year scammers stole £1.2bn from the British public. Their favourite tactic: taking over your email account.

So our Internet Security team have compiled some expert guidance to help you avoid joining those alarming statistics.

3067, 3067, Hacker, Hacker-Using-2-computers.jpg, 256951, https://www.linten.co.uk/wp-content/uploads/2019/07/Hacker-Using-2-computers.jpg, https://www.linten.co.uk/blog/gone-phishing-how-to-recognise-scam-emails-and-protect-yourself-online/hacker-using-2-computers/, Man using two laptops simultaneously, 10, , , hacker-using-2-computers, inherit, 3066, 2019-07-23 16:06:36, 2019-07-23 16:06:53, 0, image/jpeg, image, jpeg, https://www.linten.co.uk/wp-includes/images/media/default.png, 1920, 1280, Array

Last year scammers stole £1.2bn from the British public. Their favourite tactic: taking over your email account with convincing phishing emails.

There’s been a huge uplift in the number of spam emails being sent. This has risen from 204 billion in February 2019, to 459 billion at the start of June 2019. Not only are phishing emails becoming more and more numerous, they’re becoming ever smarter, and more difficult to identify.

So our Internet Security team have compiled some expert guidance to help you avoid joining those alarming statistics.

What is Phishing?

Phishing combines ‘phreaking’ (a dated form of phone hacking) and ‘fishing’. Hackers send out bait and see who unwillingly hands over access to their sensitive data in response. Phishing emails look genuine and mimic trusted email providers to trick you into giving away your password. Once they have your login details, hackers can take control of your actual email account.

Dangers of Spam Emails

Remember, our email account is ‘the key’ to every other service we use. Sophisticated phishing scams allow hackers to take control of your entire account.

If a hacker gains access to your email account, they could:

– Read your emails to know more about you. e.g. Who do you usually send and receive money from, no questions asked?

– Reset your passwords for any websites/services you are registered with.

– Identify who sends payments in your organisation and how to request money transfers.

– Send emails to clients and contacts requesting future invoices are paid elsewhere.

– Interfere with business communications and deals.

– Access your contact list to send further scam/phishing emails from your account.

In one recent case, hackers emailed the victim’s bookkeepers asking them to pay an invoice, first for £2000, then £8000. They backed up their claim with a seemingly genuine email conversation back and forth.

Another example saw a solicitor sent £120,000 to a fraudulent bank account after receiving an email with “updated bank details”.

What does Phishing look like?

Unfortunately, phishing emails often appear harmless, yet they almost always request direct action. A phishing email will usually comprise of an error message, alert, or notification, offering a simple resolution: click a link to enter your username and password:

“Hi NAME, Your account on X@Y.com will be disconnected … you need to resolve the errors on your account … [BUTTON]” 

Once you’ve clicked the button it’ll take you through to a login screen that’ll look legitimate. Nothing will usually happen once you’ve logged in but your username and password will then be saved on the scammer’s database. Once inside, they can cause potentially devastating damage to your business, finances and reputation.

How to Protect yourself Against Phishing Scams

There are a range of cybersecurity measures you can take, from implementing everyday habits to upgrading your systems. 

  1. Be Vigilant. If you get an email you are not expecting that is asking you to take action, check with your IT support team. Always confirm with a phone call to the official listed number before transferring money or updating bank details etc. Don’t fall for a fake phone number included in the email.
  2. Switch on 2Factor authorisation (2FA). Connect your Microsoft account with a mobile phone app that enables a temporary passcode from one device to another. The process takes just 20-30 minutes to set up and provides significantly enhanced security.
  3. Enrol on Cyber Security Awareness Training. Ongoing training ensures you and your staff are aware of the latest threats and how to spot them. Our user-focused awareness training is easily accessible through our automated online platform. We begin by determining your users’ current vulnerabilities, to enrol them on a personalised course of digestible modules. Phishing simulations test your knowledge in a real-life situation with data-driven reporting for improvements and compliance tracking.
  4. Enable Office 365 Advanced Threat Protection. Secure your Microsoft Office suite with industry-leading, automatic updates that evolve with the software. With the Office 365 Threat Intelligence service, you can access the latest warnings about malware found both inside and outside of your organisation, right down to the specific lines of code at risk. Protect your system with this 365 add-on. 
  5. Store Complex Passwords in a Password Manager. Always use a unique, random password for each website and service you subscribe to. Store all of your password combinations securely with a cloud Password Manager, with unlimited usage for the whole business. Within a Password Manager, you can share data safely and audit all interactions within secure AES-256 randomised encryption codes.
  6. Monitor Dark Web Data Breaches. Monitor your domain for any user/passwords that appear for sale on the Dark Web. The Linten team offer this monthly service to help customers stay one step ahead of hackers. 

Other Spam Emails to be Aware Of

Other types of spam emails include:

  • Unsolicited Advertisements (low/medium risk). 

We’re all familiar with spam emails for weight loss cures, male enhancement pills/pumps/lotions, unscrupulous dating sites, etc. To most people it’s clearly not a great idea to buy from these emails. It could just be a waste of money, or potentially dangerous if you’re buying non-approved medicines. These types of emails can generally be blocked with a spam filter like Microsoft Advanced Threat Protection or Symantec Email Security.cloud.

  • 419 Scams (medium risk). 

Also known as ‘Nigerian Scammer emails, you’ll usually receive an email out of the blue, from a stranger either claiming to be an agent for a long-lost relative, a bank manager, or a government worker offering you a large lump sum. Naturally to release this lump sum you need to wire an administration fee to your ‘agent’… never to be seen again. Spam filters work great for these emails. But if some slip through the net, we recommend Cyber Security User Awareness Training to ensure you’re not tricked into anything.

  • Trojan Horse Emails (high risk).

This email type is usually a nondescript email, enticing you to click an attachment or a link. Clicking will execute a script that will attempt to install malware onto your device. This malware can take many forms, it could be: ransomware, a keylogger, spyware, or a general virus. Ransomware in particular can cost a business a lot of money as these generally attempt to encrypt all files on a PC/Network and try to charge you to have them unencrypted. Alongside User Awareness Training, minimise risk with business-grade Antivirus solutions.

  • Email Spoofing (high risk). 

Spoofers send emails that seem to come from a known address, but actually originate from an unauthorised, external server. Amongst other scams, spoofers may send malware attachments or request money for a false invoice. Microsoft Advanced Threat Protection, alongside correctly set SFP records, will help to combat this type of email spam.

To discuss any cybersecurity concerns in more detail, or to learn more about our training and security services, get in touch with our expert support team.


OUR PROMISE TO YOU


We promise to deliver a solution that is right for your business. We understand that every organisation has its own unique requirements and we work with you to deliver the services and support that your business needs to thrive.

Highest levels of IT expertise

Friendly, helpful assistance – no jargon

Strategic partners with a focus on growth

Fast, effective solutions and reliable support

State-of-the-art security and backup

Tailored support to help you hit your targets

384, 384, case_study_c, case_study_c.jpg, 54571, https://www.linten.co.uk/wp-content/uploads/2018/01/case_study_c.jpg, https://www.linten.co.uk/case_study_c/, Careers & Community at Linten, 1, , , case_study_c, inherit, 0, 2018-01-24 14:07:56, 2018-07-31 09:11:17, 0, image/jpeg, image, jpeg, https://www.linten.co.uk/wp-includes/images/media/default.png, 640, 640, Array

Careers



Want to join a thriving IT team? We might just have the perfect opportunity for you...

Discover more
Untitled-2
Discover more
380, 380, community_hover_tile, community_hover_tile.jpg, 153839, https://www.linten.co.uk/wp-content/uploads/2018/01/community_hover_tile.jpg, https://www.linten.co.uk/community/community_hover_tile/, Community at Linten, 1, , , community_hover_tile, inherit, 223, 2018-01-23 16:48:06, 2019-02-28 10:57:48, 0, image/jpeg, image, jpeg, https://www.linten.co.uk/wp-includes/images/media/default.png, 640, 640, Array

Community



Our roots are important to us. That's why Linten play an active role in the local community.

Discover more
Untitled-2
Discover more
382, 382, case_study_a, case_study_a.jpg, 49412, https://www.linten.co.uk/wp-content/uploads/2018/01/case_study_a.jpg, https://www.linten.co.uk/case_study_a/, , 1, , , case_study_a, inherit, 0, 2018-01-24 14:07:55, 2018-04-13 13:49:26, 0, image/jpeg, image, jpeg, https://www.linten.co.uk/wp-includes/images/media/default.png, 640, 640, Array

Membership



We maintain strong links with several energetic, innovative business groups across the North West.

Discover more
Untitled-2
Discover more

Say hello




By ticking this box you agree to receive communications from Linten


LATEST NEWS


Man using two laptops simultaneously

Gone Phishing: How to Recognise Scam Emails and Protect Yourself Online

Last year scammers stole £1.2bn from the British public. Their favourite tactic: taking over your email account. Read our latest Internet Security guidance.

Office workers

How Office 365 Can Improve Your Business

Microsoft Office 365 is trusted by millions of businesses to centralise their IT systems. As Microsoft Silver Partners, we have decades of experience implementing Microsoft Online to improve business efficiency.

Say hello




By ticking this box you agree to receive communications from Linten