<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.actisofttechnology.com/blogs/Uncategorised/feed" rel="self" type="application/rss+xml"/><title>ActiSoft Technology - Blog , Uncategorised</title><description>ActiSoft Technology - Blog , Uncategorised</description><link>https://www.actisofttechnology.com/blogs/Uncategorised</link><lastBuildDate>Wed, 22 Apr 2026 17:12:34 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[UK Cybersecurity Org Offers Advice for Thwarting BEC Attacks]]></title><link>https://www.actisofttechnology.com/blogs/post/uk-cybersecurity-org-offers-advice-for-thwarting-bec-attacks1</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-133940537.jpg"/>Written by Stu Sjouwerman The UK’s National Cyber Security Centre (NCSC) has issued guidance to help medium-sized organisations defend themselves again ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_kXPb-INrQjiW74Q9u08oKg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_wgsRe_f6SvmeCJ-DdPrNRQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_b7Z04h72QieFLn5crFVLmQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_b7Z04h72QieFLn5crFVLmQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_kB6yVlmOP6Vj5eKjfr4QbA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kB6yVlmOP6Vj5eKjfr4QbA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:14px;">Written by Stu Sjouwerman</span></p></div>
</div><div data-element-id="elm_H7FnqAgfLz2t6YDvCVZxbw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_H7FnqAgfLz2t6YDvCVZxbw"] .zpimagetext-container figure img { width: 500px ; height: 325.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_H7FnqAgfLz2t6YDvCVZxbw"] .zpimagetext-container figure img { width:500px ; height:325.00px ; } } @media (max-width: 767px) { [data-element-id="elm_H7FnqAgfLz2t6YDvCVZxbw"] .zpimagetext-container figure img { width:500px ; height:325.00px ; } } [data-element-id="elm_H7FnqAgfLz2t6YDvCVZxbw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/55e3dc434f53a414f6da8c7dda79367f103cd9ed55536c48732f7fd0964dc45db0_1280.jpg" width="500" height="325.00" loading="lazy" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p style="margin-bottom:20px;"><span style="font-size:18px;">The UK’s National Cyber Security Centre (NCSC) has issued guidance to help medium-sized organisations defend themselves against business email compromise (BEC) attacks, especially those targeting senior staff members.</span></p><p style="margin-bottom:20px;"><span style="font-size:18px;">The NCSC says employees should be cautious about the type of personal information they post on the internet, since criminals can use this knowledge to make their attacks more convincing.</span></p><p style="margin-bottom:20px;"><span style="font-size:18px;">“If there is information about senior staff on work and private websites, including social media accounts and networking sites, criminals can use this to make their&nbsp;<a href="/what-is-phishing" title="phishing" rel="">phishing</a><a href="https://www.knowbe4.com/phishing" rel="noopener" target="_blank">&nbsp;</a>emails appear more convincing,” the advisory says.</span></p></div></div></div>
</div></div><div data-element-id="elm_RQ_v9Ab0wfVoWJJwoxGWgA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_RQ_v9Ab0wfVoWJJwoxGWgA"] .zpimagetext-container figure img { width: 160px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_RQ_v9Ab0wfVoWJJwoxGWgA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_RQ_v9Ab0wfVoWJJwoxGWgA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } [data-element-id="elm_RQ_v9Ab0wfVoWJJwoxGWgA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/11.27_Phish_Your_Users_160x600.jpg" width="160" height="600" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:18px;">“This information, freely available on the internet, is known as a ‘digital footprint’. Without this information, the phishing emails used to conduct BEC should be easier to spot as fraudulent. All staff, but especially senior executives who have access to valuable assets or information, should review their privacy settings on their social media accounts, and think about what they post in order to reduce their digital footprint.”</span></div><div><br></div><div><span style="font-size:18px;">The NCSC stresses that BEC attacks are more targeted than most phishing emails, and are more likely to bypass technical security measures.</span></div><div><br></div><div><span style="font-size:18px;">“Since BEC emails are normally sent in low volume, standard email filters (designed to identify ‘scam emails’) may struggle to detect them, especially if they come from a legitimate email account that has already been hacked,” the advisory says.</span></div><div><br></div><div><span style="font-size:18px;">“Alternatively, a BEC email may have been sent from a ‘spoofed’ domain, designed to trick users that they are dealing with a legitimate organisation. Some BEC emails may contain viruses disguised as invoices, which are activated when opened.”</span></div></div></div></div></div></div>
</div></div><div data-element-id="elm_2OpsLVgqJJOq6ycE8i5xxA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2OpsLVgqJJOq6ycE8i5xxA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p style="margin-bottom:20px;"><span style="font-size:18px;">The NCSC says users should be on the lookout for the following red flags associated with BEC attacks:</span></p><ul><ul><li><span style="font-size:18px;">“Think about your usual working practices around financial transactions. If you get an email from an organisation you don't do business with, treat it with suspicion</span></li><li><span style="font-size:18px;">Look out for emails that appear to come from a senior person within your organisation, requesting a payment to a particular account. Look at the sender's name and email address. Does it sound legitimate, or is it trying to mimic someone you know</span></li><li><span style="font-size:18px;">Does the email contain a veiled threat that asks you to act urgently? Be suspicious of phrases like 'send these details within 24 hours' or 'you have been a victim of crime, click here immediately.'&quot;</span></li></ul></ul><p style="margin-bottom:20px;"><span style="font-size:18px;">KnowBe4 empowers your workforce to make smarter security decisions every day. Over 65,000 organisations worldwide trust the KnowBe4 platform to strengthen their&nbsp;security culture&nbsp;and reduce human risk.security culture&nbsp;and reduce human risk.</span></p><p style="margin-bottom:20px;"><span>The NCSC has the&nbsp;<a href="https://www.ncsc.gov.uk/guidance/business-email-compromise-defending-your-organisation" target="_blank" rel="noopener">story</a>.</span></p><p style="margin-bottom:20px;"><span>Other NSCS resources on BEC;</span></p><p style="margin-bottom:20px;"><span></span></p><p style="margin-bottom:20px;"><span><span style="color:inherit;"><a href="https://www.ncsc.gov.uk/blog-post/business-email-compromise-guidance-protect-organisation" title="Business email compromise: new guidance to protect your organisation" rel="">Business email compromise: new guidance to protect your organisation</a></span><br></span></p><p style="margin-bottom:20px;"><span></span></p><p style="margin-bottom:20px;"><span></span></p><p style="margin-bottom:20px;"><span><span style="color:inherit;"><a href="https://www.ncsc.gov.uk/files/Business-email-compromise-payment-diversion-fraud.pdf" title="Business email compromise Dealing with targeted phishing emails Graphic" rel="">Business email compromise Dealing with targeted phishing emails Graphic</a></span><br></span></p></div></div></div>
</div><div data-element-id="elm_IkMBfjfkq_toKT5YlIKXYA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_IkMBfjfkq_toKT5YlIKXYA"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_IkMBfjfkq_toKT5YlIKXYA"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_IkMBfjfkq_toKT5YlIKXYA"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_RxjyZJHuFhLSXSjBuVmbxA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_RxjyZJHuFhLSXSjBuVmbxA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><div style="color:inherit;"><h2>Start Your Free Phishing Security Test</h2></div></h2></div>
<div data-element-id="elm_uhVJ_dRy8ZPVT342pdm83Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_uhVJ_dRy8ZPVT342pdm83Q"].zpelem-heading { border-radius:1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><div style="color:inherit;"><h5>Find out what percentage of your employees are Phish-prone</h5></div></h5></div>
<div data-element-id="elm_6bsQ4w6nCowjqYuuWCo0gQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6bsQ4w6nCowjqYuuWCo0gQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Did you know that 91% of successful data breaches started with a spear phishing attack?</div><br><div>Find out what percentage of your employees are Phish-prone™ with your free phishing security test. Plus, see how you stack up against your peers with the new phishing Industry Benchmarks!</div><div><br></div><div>IT pros have realised that simulated phishing tests are urgently needed as an additional security layer. Today, phishing your own users is just as important as having antivirus and a firewall. It is a fun and an effective cybersecurity best practice to patch your last line of defence: USERS</div><div><br></div><div><span style="font-style:italic;font-weight:700;">Why? If you don't do it yourself, the bad guys will.</span></div></div></div>
</div><div data-element-id="elm_dy3BvJzjfNr1NdRqp2Me3Q" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_dy3BvJzjfNr1NdRqp2Me3Q"] .zpimageheadingtext-container figure img { width: 300px !important ; height: 254px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_dy3BvJzjfNr1NdRqp2Me3Q"] .zpimageheadingtext-container figure img { width:300px ; height:254px ; } } @media (max-width: 767px) { [data-element-id="elm_dy3BvJzjfNr1NdRqp2Me3Q"] .zpimageheadingtext-container figure img { width:300px ; height:254px ; } } [data-element-id="elm_dy3BvJzjfNr1NdRqp2Me3Q"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture3.png" width="300" height="254" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><h3 style="font-size:24px;"><span style="font-weight:700;">Here's how it works:</span></h3></div></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><ul><li><span style="font-size:18px;">Immediately start your test for up to 100 users (no need to talk to anyone)</span></li><li><span style="font-size:18px;">Select from 20+ languages and customise the phishing test template based on your environment</span></li><li><span style="font-size:18px;">Choose the landing page your users see after they click</span></li><li><span style="font-size:18px;">Show users which red flags they missed, or a 404 page&nbsp;</span></li><li><span style="font-size:18px;">Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management</span></li><li><span style="font-size:18px;">See how your organisation compares to others in your industry</span></li></ul></div></div>
</div></div></div><div data-element-id="elm_ZijNCVwmjf5erjAJ0TQw8A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ZijNCVwmjf5erjAJ0TQw8A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:700;">The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.</span><br></div><div><span style="font-weight:700;"><br></span></div><div><span style="font-weight:700;"><div>Start phishing your users now. Fill out the form, and get started immediately!</div></span></div></div></div>
</div><div data-element-id="elm_AzW8PMl7RyChqHRDuNkjnQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_AzW8PMl7RyChqHRDuNkjnQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" title="Link to a free phishing test for up to 100 users" title="Link to a free phishing test for up to 100 users"><span class="zpbutton-content">Try It Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 23 May 2024 16:03:13 +0000</pubDate></item></channel></rss>