There are new non-traditional cyberthreats emerging in 2022 that businesses need to be aware of.
As always, Cultrix do the research for you when it comes to looking after the technology that keeps your business secure and compliant, because being clued-up, particularly about cyberthreats, helps you stay ahead of the game.
Here’s our latest advice.
Take nothing at face value
Cyberthreats are developing into non-traditional areas, meaning that the way they threaten the security of businesses and their data might not be what you expect, with the increasing potential to take businesses by surprise.
‘Take nothing at face value’ sounds like a cliché, but it’s the surprise element that catches businesses out time and again. Cybercriminals take advantage of this by working underhandedly in the ‘normal’ routines of a business so they don’t seem out of place, until the threat has done its damage.
If it seems odd, don’t trust it
Our increasingly online business operations mean that we have learnt over time to take many things at face value.
We trust that our files and documents are saved, without actually having them physically in front of us. We trust that messages are from the people we know, even though we can’t see or hear those people. And we trust ‘formal-looking’ communication because in business that’s what we associate with integrity.
Letters pretending to be from suppliers
Although not strictly speaking IT, this is a threat we all need to be aware of, even as consumers. At Cultrix, we are seeing an increasing number of businesses receiving physical letters through the post, supposedly from suppliers, informing of a change of bank details.
If you receive a letter, claiming to be from a supplier, your first response should be mistrust. You must:
- Pick up the phone to your supplier and speak to your named contact
- Ask them to verify whether there has been a change of payee details
- Inform them of the letter you have received so they can take the necessary action
Emails claiming your inbox is full
Another common cybercrime strategy is to send emails telling you your inbox is full and you must click, or enter details, to release important quarantined messages.
If you receive an email like this, again, your first response needs to be ‘don’t trust it’. If you want to investigate your inbox, or any other account where you login, you need to:
- NOT click on any links contained in the email
- Delete the email and report it to the organisation it purports to be from
- Go to the website of the account it is asking you to visit and log in from there if you want to check any action required
While you’re asleep…
Cybercriminals are taking increasing advantage of the hours businesses don’t operate, such as nights and weekends. It means, if they are successful in their attack, more time elapses before support and is available and any remedial action applied. Obviously, the damage the crime causes has the opportunity to be far greater this way.
Although you may have reputable antivirus in place, there are never any guarantees. With IT support that monitors and surveys your systems round the clock, there is a better chance of catching a security breach, even in the vulnerable downtime hours.
We monitor the horizon so you don’t have to
IT security is a round-the-clock, constant vigil. Business owners and their staff can be alert and aware to the risks, which in itself affords some protection, with the overriding theme of approach being, don’t take anything at face value.
If you’re concerned you don’t have the right IT security in place, speak to our cybersecurity team at Cultrix.
Do small businesses need to worry about cyberattacks?
If you think as a small business, you don’t need to worry about cybercriminals targeting your data, you’re wrong and it’s our happy job to tell you why.
Ready to go passwordless?
“Password” is still one of the most popular passwords. If this is you, read on. Here’s what you should know about passwords and maybe going passwordless.