Business e-mail negotiations are small businesses, as they only target corporate goals with minimum processes, protocols and safeguards that apply – too small to have broad cybersecurity capital.

According to the FBI Internet Crime Complaint Center, email business talks cost more than $ 675 million in 2017, until the arrest of cyber criminals in the 74th year in the United States and abroad is Triumph for both large and small companies.

Even though a group of cyber gangs has been taken offline

there are many more. Earlier this year, the US House of Small Business Small Commissions warned hackers who targeted and attacked them with the most sophisticated threats they had, and raised levels.

Another one, the committee member, said there was reason to believe that the hacker would continue to be a small business target especially now.

The impact of cyber crime shock

In March, New York claimed to release Virginia-based trade associations for more than $ 1 million.

Who uses the classic business discussion email tricks, such as copying email addresses from known vendors and asking travel trade associations to send future payments to new accounts. Of course, this scheme works – at least some.

But the question remains: Why can he reach trade associations?

BEC is a form of sophisticated phishing, cyber-fraud that invites users to get unauthorized emails. Some security measures can detect and repair email, and the largest organizations available.

Rather, smaller organizational budgets, better issues, smaller issues, and non-cyber issues can be a bigger priority. As a result, some small businesses have protocols, procedures and protections for false email flags.

small businesses need to take immediate action to improve security measures against threatening email discussions because, according to First Business Financial Services, 38 percent of SMBs are victims of companies in all industries. This attack method is not ready, so take precautionary measures is the safest bet.

Hazardous safety at limited estimates

Just because small businesses know that there is a risk of cyberattacks does not mean they can start cybersecurity budgeting. Fortunately, more spending is not important because of smart spending.

The intended protection can not end any attack, but it can solve the most common and most expensive. To prioritize business security, focus your efforts on the following steps:

Enforce standard email authentication authentication.

Emails are highly vulnerable to spoofing and save security risks primarily because users are confident and secure in the inbox. E-mail compromise email and phishing scripts are often humiliated, but using the verification standards can protect spoofing.

Start by entering the standard e-mail address confirmation address. This includes the Sender Policy Framework, MailKomponent DomainKeys and Authentication Message, Reporting and Appropriateness. It requires your business partner to also perform standard email verification.

Tap an external expert.

Effective sender standards, but also complex enough to be implemented and maintained. If protecting corporate security is easy, the FBI will not receive more than 4 million internet crime complaints between 2000 and 2017.

For small businesses, the best solution is to find a provider or partner that provides useful tools for reliable implementation of standards.

Take more approaches to safety.

Cyber ​​fraud is designed to modify general security measures, and use the sender confirmation standard does not guarantee that the inbox is free of charge.

Ensure layered security includes scammers filtering to identify a single-character domain from a trusted domain.

Also, it creates an internal email filter that can block external e-mail that looks like an internal user. Take a nested approach approach in identifying the many techniques used in BEC attacks.

 Create a process for managing wire transfers.

Verify the legitimacy of any wire or change the payment address. Contact a verified person or phone number. Do not use the email chain contact information you make requests.

 Teach the user.

Despite all the available technologies, users remain a critical defensive line. The more you recognize the risks and the threats, the more likely they are.


Please enter your comment!
Please enter your name here