<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.actisofttechnology.com/blogs/education/feed" rel="self" type="application/rss+xml"/><title>ActiSoft Technology - Blog , Education</title><description>ActiSoft Technology - Blog , Education</description><link>https://www.actisofttechnology.com/blogs/education</link><lastBuildDate>Wed, 22 Apr 2026 17:12:36 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Every Employee is Part of Your Security]]></title><link>https://www.actisofttechnology.com/blogs/post/every-employee-is-part-of-your-security</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-668218754.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman Employees are an essential component of an organisation’s security defences, according to Nico Popp, ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OBEOW67jSD6M-x8VXdxeyA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dfDGAZ9OQ6K6NWWHR6fCBQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_dfDGAZ9OQ6K6NWWHR6fCBQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_zfPJOpfgQWqDExTLwj4qZQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_VJ0FgRjLGewww8IQVhAEPA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VJ0FgRjLGewww8IQVhAEPA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_k8DGAu28xdDIedto0Ey2dA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_k8DGAu28xdDIedto0Ey2dA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-668224090s.jpg" size="medium" data-lightbox="true" style="width:629px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Employees are an essential component of an organisation’s security defences, according to Nico Popp, Chief Product Officer at Forcepoint. On the CyberWire’s Hacking Humans podcast, Popp explained that humans generally want to do the right thing and can help prevent cyberattacks that can’t be stopped by technical safeguards. Popp pointed to the way financial institutions have their customers verify potentially suspicious transactions as an example of this.</div><p><br></p><div>“I always use the example of credit card companies,” he said. “They have been brilliant. You know, they have huge fraud issues. And what have they done? They basically involve us in the process of solving, right? They don't always block your credit card. They may block you, but they may ask you, you know what? We've seen that transaction. It looks suspicious to us. Is that really you trying to complete this thing? And it's working, right? Can you imagine, they are using all these consumers to solve the fraud problem? And, of course, we care. So we participate.”</div></div>
</div></div><div data-element-id="elm_V7Km9BL1TSip0ssYhMbVqA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_V7Km9BL1TSip0ssYhMbVqA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="text-align:left;"> Popp concluded that organisations need to shift the way they think about how employees fit into their security posture. </div>
<p style="text-align:left;"><br></p><div style="text-align:left;"> “So, taking that concept of putting the human in the middle and saying, look, you’re part of the solution,” Popp said. “We're going to engage you. It’s not just about monitoring you, spying on you. Quite the opposite. We’re trying to make you better. But also, we want you to be part of our cybersecurity team, you know, because we want to be able to leverage the fact that we have this smart and caring human being, common folks behind the keyboard that also care about the company assets and can help there. Something that cyber has never done, really, that whole idea of putting humans in the middle of cyber. It’s all this different dimension, these different approaches.” </div>
<p style="text-align:left;"><br></p><div style="text-align:left;"><div><div>New-school <a href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" title="security awareness training" target="_blank" rel="">security awareness trainin</a><a href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" title="security awareness training" target="_blank" rel="">g</a> can create a culture of security within your organisation by enabling your employees to thwart <a href="/social-engineering" title="social engineering" target="_blank" rel="">social engineering</a> attacks.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</div></div>
</div><p style="text-align:left;"><br></p><div style="text-align:left;"><div> The CyberWire has the <a href="https://thecyberwire.com/podcasts/hacking-humans/133/transcript" title="story." target="_blank" rel="">story.</a></div>
</div></div></div><div data-element-id="elm_4VTWrLtdYBzoTU5V5swsuQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_4VTWrLtdYBzoTU5V5swsuQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM%20Horizontal.png" size="original"/></picture></a></figure></div>
</div><div data-element-id="elm_1eOGWQwkf5fUTJW1RvwmYA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_1eOGWQwkf5fUTJW1RvwmYA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Request A Demo: <span style="font-weight:700;">Security Awareness Training</span></h2></div>
<div data-element-id="elm_AW7U6ySzDVXoH-vKCbp7eQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_AW7U6ySzDVXoH-vKCbp7eQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/SAT.png" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">New-school Security Awareness Training is critical to enabling you and your IT staff to connect with users and help them make the right security decisions all of the time. This isn't a one and done deal, continuous training and simulated phishing are both needed to mobilize users as your last line of defence. Request your one-on-one demo of KnowBe4's <a href="/security-awareness-training" title="security awareness training" target="_blank" rel="">security awareness training</a> and simulated phishing platform and see how easy it can be!</span><br></p></div>
</div></div><div data-element-id="elm_iMUdBQbfSoOuOaIi-o6DLg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_iMUdBQbfSoOuOaIi-o6DLg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Save My Spot!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 09 Feb 2021 13:52:55 +0000</pubDate></item><item><title><![CDATA[Here Are Some Truly Scary Social Media Stats!]]></title><link>https://www.actisofttechnology.com/blogs/post/here-are-some-truly-scary-social-media-stats</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.comhttps://images.unsplash.com/photo-1579869847557-1f67382cc158?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman Scamming incidents have increased by 519% in 2020 compared to last year, according to researchers at ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_GUdK3FRZSkiJZLRxgWak9A" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_VugIr6mlSESxGuTqsX_S2g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_RRKNJflKSaKbp4xSf6Xl0Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_RRKNJflKSaKbp4xSf6Xl0Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_4BvJhkhYVdQQae5QTu8U6w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_4BvJhkhYVdQQae5QTu8U6w"].zpelem-text { border-radius:1px; margin-block-start:3px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:14px;">Blog courtesy of KnowBe4</span></p><p><span style="font-size:14px;">Written by Stu Sjouwerman</span></p></div>
</div><div data-element-id="elm_pLNBaNMSxCcWaUD1Ozet5Q" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_pLNBaNMSxCcWaUD1Ozet5Q"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1594979194853-f7dcd77a0a1b?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="small" data-lightbox="true" style="width:1080px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">Scamming incidents have increased by 519% in 2020 compared to last year, according to researchers at Baltimore-based ZeroFOX. The researchers compared their own data to a recent report from the Federal Trade Commission, which found that scams on social media have skyrocketed since the start of the pandemic earlier this year. ZeroFOX says their data aligns with the findings in the FTC’s report, and they’ve observed a significant year-over-year increase in scams:</span><br></p></div>
</div></div><div data-element-id="elm_cU-s9dP2adia7AU29rV4Aw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_cU-s9dP2adia7AU29rV4Aw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><ul><ul><li><span style="color:inherit;">423% increase in Financial Services (scammers/money mulers targeting banking customers)</span></li><li><span style="color:inherit;"><p>1579% increase in Retail scams</p></span></li><li><p><span style="color:inherit;">226% increase in Consumer Goods scams</span><br></p></li><li><p><span style="color:inherit;"><span style="color:inherit;">295% increase in HR scams, which could align with scammers looking to capitalize on work from home opportunities and lay-off/furloughs due to the pandemic</span><br></span></p></li><li><p><span style="color:inherit;"><span style="color:inherit;"><span style="color:inherit;">164% increase in crypto giveaway scams, where an account is taken over or an impersonator profile is created to look like an influencer to peddle the scam</span><br></span></span></p></li><li><p><span style="color:inherit;"><span style="color:inherit;"><span style="color:inherit;"><span style="color:inherit;">609% increase in money flipping scams</span><br></span></span></span></p></li><li><p><span style="color:inherit;"><span style="color:inherit;"><span style="color:inherit;"><span style="color:inherit;"><span style="color:inherit;">100% increase in impersonating profiles that have someone who claims to work for a company in HR, but does not.</span><br></span></span></span></span></p></li></ul></ul></div>
</div><div data-element-id="elm_FqpqiG-5Su-jEfeFLo9wGQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_FqpqiG-5Su-jEfeFLo9wGQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" title="Demo" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="small" data-lightbox="false" style="width:300px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>ZeroFOX concludes that this activity will continue to proliferate, since scammers have no reason to change their methods.</div><div><br></div><div>“ZeroFOX Alpha Team assesses that scammers will likely continue to use the pandemic as an opportunity to take advantage of desperate consumers,” the researchers write. “Emotional and economic distress can leave victims vulnerable to these scams, especially ones designed to alleviate stress and reduce the impact of the pandemic. Alpha Team also assesses that the scam types will remain constant and we will not see many new scams, mostly due to the years of experience and resources available for tried and tested scams. The old adage ‘don’t fix what isn’t broke’ applies to bad actors as well. As always, be mindful when using social media for business or for personal use to prevent yourself from becoming the next victim to a social media scam.”</div><div><br></div><div><div>New-school <a href="/the-system-works" title="security awareness training" target="_blank" rel="">security awareness training</a> can give your employees a healthy sense of suspicion so they can avoid falling victim to <a href="/social-engineering" title="social engineering" target="_blank" rel="">social engineering</a> techniques.</div></div><div><br></div><div><div>ZeroFOX has the <a href="https://www.zerofox.com/blog/ftc-social-media-scams/" title="story." target="_blank" rel="">story.</a></div></div></div>
</div></div><div data-element-id="elm_vDGyOWEKSNwz7dkZvDIS3w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vDGyOWEKSNwz7dkZvDIS3w"].zpelem-heading { border-radius:1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Don't get hacked by <span style="font-weight:700;">social media phishing</span> attacks!</h5></div>
<div data-element-id="elm_8LKSDFNFDQDhmn0IYdtKIQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8LKSDFNFDQDhmn0IYdtKIQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div>Many of your users are active on Facebook, LinkedIn, and Twitter. The bad guys use these platforms to <span style="font-weight:700;">scrape profile information</span><span style="font-weight:700;"> of your users</span> and organisation to create targeted spear phishing campaigns in an attempt to <span style="font-weight:700;">hijack accounts, damage your organisation's reputation, or gain access to your network.</span></div></div><div><br></div><div><div><span style="font-weight:700;">KnowBe4’s Social Media Phishing Test</span> is a complimentary IT security tool that helps you identify which users in your organization are vulnerable to these types of phishing attacks that could put your users and organisation at risk.</div></div></div>
</div><div data-element-id="elm_1_Ao9_hqWewHqJwdXG6YUw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_1_Ao9_hqWewHqJwdXG6YUw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/social-media-phishing-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" title="Social Media Phishing Test" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture1.png" size="small" data-lightbox="false" style="width:440px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;font-weight:700;">Here's how the Social Media Phishing Test works:</span><br></p><p><span style="color:inherit;font-weight:700;"><span style="color:inherit;"></span></span></p><ul><ul><li>Immediately start your test with your&nbsp;<strong>choice of three social media phishing templates</strong></li><li><strong>Choose the corresponding landing page&nbsp;</strong>your users see after they click</li><li>Show users which&nbsp;<strong>red flags they missed</strong>&nbsp;or&nbsp;<strong>send them to a fake login page</strong></li><li>Get a&nbsp;<strong>PDF emailed to you in 24 hours</strong>&nbsp;with your percentage of clicks and data entered</li></ul></ul></div>
</div></div><div data-element-id="elm_3MDym53RTf2QXcO-nK0Kqw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_3MDym53RTf2QXcO-nK0Kqw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/social-media-phishing-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" title="Social Media Phishing Test"><span class="zpbutton-content">Go Phishing Now!</span></a></div>
</div><div data-element-id="elm_YWkVCgvdx9JaxAB_DCvVfQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YWkVCgvdx9JaxAB_DCvVfQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Don't like to click on redirected buttons? Cut &amp; Paste this link in your browser:</span><br></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;"><a href="https://info.knowbe4.com/social-media-phishing-test-partner?partnerid=0010c00001ywD8SAAU">https://info.knowbe4.com/social-media-phishing-test-partner?partnerid=0010c00001ywD8SAAU</a><br></span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 29 Oct 2020 15:04:40 +0000</pubDate></item><item><title><![CDATA[Don't be Fooled by Fakes]]></title><link>https://www.actisofttechnology.com/blogs/post/dont-be-fooled</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-1034171778.jpg"/>Phishing emails come in all shapes and sizes, some seem extremely poor, and some are very authentic. Both have their purpose. The poor ones with spelli ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_CotcJuVHQq6n_9BatHvtDw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_jfS7LkbaTDiL45Uh4QYRwA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_aQi2rBweRNK--aM_7HVbEA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_4-JRsTWwTPyEax8LdX4bOg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4-JRsTWwTPyEax8LdX4bOg"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">Just a Little Phish</h1></div>
<div data-element-id="elm_2NtFICBjQoG9G0Mn2NVPjg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2NtFICBjQoG9G0Mn2NVPjg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><span style="font-size:13.5pt;color:rgb(1, 42, 83);">Phishing emails come in all shapes and sizes, some seem extremely poor, and some are very authentic.</span></p><p></p><div style="text-align:left;"><span style="color:rgb(1, 42, 83);"><br></span></div><div style="text-align:left;"><span style="color:rgb(1, 42, 83);"><span style="font-size:13.5pt;">Both have their purpose.</span><br></span></div><p></p><p></p><div style="text-align:left;"><span style="color:rgb(1, 42, 83);"><br></span></div>
<p></p><p style="text-align:left;"><span style="font-size:13.5pt;color:rgb(1, 42, 83);">The poor ones with spelling mistakes and bad grammar are not a mistake, they are intentional. They are looking to draw in those that will fall for the scam and will pay, they are homing in on their ‘target market’. If you spot the mistakes you are not the type of person who would fall for their scam whether they are perfectly written or not.</span></p><p></p><div style="text-align:left;"><span style="color:rgb(1, 42, 83);"><br></span></div>
<p></p><p style="text-align:left;"><span style="font-size:13.5pt;color:rgb(1, 42, 83);">It is all about their conversion rates, we will be going into more detail on this in a future blog.</span></p><p></p><div style="text-align:left;"><span style="color:rgb(1, 42, 83);"><br></span></div>
<p></p><p style="text-align:left;"><span style="font-size:13.5pt;color:rgb(1, 42, 83);">In the past they have done it to try and beat email security and spam filters. They have done their A/B testing and know what works!</span></p><p style="text-align:left;"><span style="font-size:13.5pt;color:rgb(1, 42, 83);">If the email is coming from an individual as opposed to an organisation it makes them seem more authentic, most people do not write their emails as a professional copy writer would.</span></p><p></p><div style="text-align:left;"><span style="color:rgb(1, 42, 83);"><br></span></div>
<p></p><p style="text-align:left;"><span style="font-size:13.5pt;color:rgb(1, 42, 83);">We all make typo’s and don’t always use the correct grammar, were human and make mistakes, when we receive such an email we can all associate with it. Recent attacks have mentioned an attachment in the email but haven’t attached anything, we’ve all done that, but the scammers do it to build rapport as their ‘error’ is relatable.</span></p><p></p><div style="text-align:left;"><span style="color:rgb(1, 42, 83);"><br></span></div>
<p></p><p style="text-align:left;"><span style="font-size:13.5pt;color:rgb(1, 42, 83);">Never dismiss the sender of poorly written Phishing emails as stupid, unfortunately they are usually quite smart and have done their homework on human behaviour.</span></p><p></p><div style="text-align:left;"><span style="color:rgb(1, 42, 83);"><br></span></div>
<p></p><p style="text-align:left;"><span style="font-size:13.5pt;color:rgb(1, 42, 83);">With emails sent from organisations we are usually less sympathetic to typo’s and grammatical errors after all they should go through a process and be proof read and approved.</span></p><p></p><div style="text-align:left;"><span style="color:rgb(1, 42, 83);"><br></span></div>
<p></p><p></p><p style="text-align:left;"><span style="font-size:13.5pt;color:rgb(1, 42, 83);">See the example below that I have received today;</span></p></div>
</div><div data-element-id="elm_im4TtiOztCVQilzQfKS06w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_im4TtiOztCVQilzQfKS06w"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/Amazon%20Prime%20Phish.png" size="medium" data-lightbox="true" style="width:900px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);">The above is a screenshot of an email received and viewed on my mobile phone. As you will be aware they don’t usually show the full sender so unless you click on the sender’s ‘Display Name’ to see the full email address you could be duped into believing that it may be genuine.</span></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);"><br></span></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);">If you were to compare this email to a genuine one from Amazon you would spot very few errors. The links at the top of the email to ‘Your Orders’, ‘Your Account’ and ‘Amazon.com’ are all genuine links that take you to the real Amazon site. This is a common tactic used by bad actors to provide a level of authenticity to their communication.</span></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);"><br></span></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);">Can you spot any mistakes or grammatical errors on the email?</span></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);"><br></span></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);">The ‘nasty’ is in the ‘Revise your payment’ which is the main link you are going to go for. With the current economic climate and everyone worrying about their financial position such Phishing emails are preying on the fear of a payment ‘bouncing’.</span></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);"><br></span></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);">Spelling and grammar are more important when impersonating a brand as the expectation is that they will be checked before being sent out.</span></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);"><br></span></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);">I can’t think of a single brand that would start their communication with just ‘Hello’. They will use your name as opposed to nothing or customer etc. If your email has been part of a data breach elsewhere they may not have your name and with personal email addresses it is difficult to get a name, how would you get a first name from skywalker785342@?</span></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);"><br></span></p><p></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);">How could I easily tell it was a phishing scam? I don't have an Amazon Prime Membership!</span></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);">We cannot be too careful when clicking on links in emails, even ones from trusted sources. A single momentarily lapse can cause you a lot of grief and money.</span></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);"><br></span></p><p></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);">Pass what you learn on to those that don’t spend their working day in front of a computer and aren’t as tech savvy that way we are all working towards reducing the threat.</span></p></div>
</div></div><div data-element-id="elm_Zdfhtdk3IMm00TvBuTu4YA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Zdfhtdk3IMm00TvBuTu4YA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);">Also, take one minute out of your day to report these emails, nothing can be done about them if the relevant authorities or brands know nothing about them.</span></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);"><br></span></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);">I forwarded this one onto&nbsp;<a href="mailto:stop-spoofing@amazon.com">stop-spoofing@amazon.com</a>&nbsp;and&nbsp;<a href="mailto:report@phishing.gov.uk">report@phishing.gov.uk</a>. It does make a difference and it does get acted upon.</span></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);"><br></span></p><p></p><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);">For text scams forward them onto 7726.</span></p></div>
</div><div data-element-id="elm_AXIKWEBOyfVSWQ-recQzlg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_AXIKWEBOyfVSWQ-recQzlg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/Q2%202020%20Top%2010%20Impersonated%20Brands.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_3NNSEM3PmXMv-THBOAChzg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3NNSEM3PmXMv-THBOAChzg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:13.5pt;color:rgb(1, 42, 83);">To find out all about the different methods of Phishing that there are visit our pages using the links below;</span></p><p><span style="font-size:13.5pt;"><br></span></p><p><span style="color:inherit;"></span></p><p align="center" style="text-align:center;"><span style="font-size:13.5pt;"><a href="https://sitebuilder-20068019420.zohositescontent.eu/what-is-phishing">Phishing</a>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<a href="https://sitebuilder-20068019420.zohositescontent.eu/what-is-spear-phishing">Spear-Phishing&nbsp;</a></span><span style="text-align:left;">&nbsp; &nbsp;&nbsp;</span><span style="text-align:left;">&nbsp; &nbsp;&nbsp;</span><a href="https://sitebuilder-20068019420.zohositescontent.eu/what-is-ceo-fraud" style="font-size:13.5pt;">CEO Fraud&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</a><a href="https://sitebuilder-20068019420.zohositescontent.eu/social-engineering" style="font-size:13.5pt;">Social Engineering</a></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 07 Sep 2020 11:19:13 +0000</pubDate></item><item><title><![CDATA[Something looks Phishy!]]></title><link>https://www.actisofttechnology.com/blogs/post/something-looks-phishy</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-533992794.jpg"/>Train & Educate your users so that they can make better informed decisions.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_4_ycViwLS06bMMc1vgx4PA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_8eqKTCQzQyWZmUtsUKb3MQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_kRFpmVU9S0ig6ayN1761xg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_HAbdo81WSH2hm8qC3cGafQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_HAbdo81WSH2hm8qC3cGafQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Can your users spot a phish?</span></h2></div>
<div data-element-id="elm_yjstZHIgTj-KLs7mWtFKJg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_yjstZHIgTj-KLs7mWtFKJg"].zpelem-text { color:#012a53 ; border-radius:1px; } [data-element-id="elm_yjstZHIgTj-KLs7mWtFKJg"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#012a53 ; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">When you have a new starter in your organisation you give them the latest hardware and other fancy gadgets. You teach them how to use your business system, how to book holiday, how to claim for expenses but do you train them on what to look out for on a phishing email?</span></p><p style="margin-bottom:0.0001pt;"></p><div style="text-align:left;"><br></div>
<p></p><p style="text-align:left;margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">You want them to hit the ground running contributing to the business increasing the bottom line of the company and you want that return on investment as quickly as possible so why bother having them trained in something they should already know or something that doesn't contribute to the bottom line?</span></p><p style="margin-bottom:0.0001pt;"></p><div style="text-align:left;"><br></div>
<p></p><p style="text-align:left;margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">The reason to train your users in how to recognise a phishing email or to at least raise concerns with the IT Department protects your bottom line, one wrong click and you could be paying the price for training your users!</span></p><p style="margin-bottom:0.0001pt;"></p><div style="text-align:left;"><br></div>
<p></p><p><span style="color:inherit;"></span></p><p style="text-align:left;margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">Many security reports from trusted sources are telling us that threats to businesses are growing and are going to continue growing year on year. There has been an increase in phishing, spear phishing and whaling attacks and whilst the majority will be picked up by email and spam filtering it only takes one to get through to cause devastation to your company then you are down to relying on your tape backups for recovery, remember those tape backups that you have been meaning to test but haven't gotten around to it yet...</span></p></div>
</div><div data-element-id="elm_uYybE5Kdy2sNmSySXxovkQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_uYybE5Kdy2sNmSySXxovkQ"].zpelem-imagetext .zpimage-text, [data-element-id="elm_uYybE5Kdy2sNmSySXxovkQ"].zpelem-imagetext .zpimage-text :is(h1,h2,h3,h4,h5,h6){ color:#012a53 ; } [data-element-id="elm_uYybE5Kdy2sNmSySXxovkQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-668224090s.jpg" size="medium" data-lightbox="true" style="width:629px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><span style="font-size:18px;">A lot of companies help the threat actors with the information they give away on the company website, job titles, email address, mobile phone number etc and this will increase the chances of Social Engineering attacks.</span></div><p><span style="font-size:18px;"><br></span></p><p><span style="font-size:18px;">Am I scaring you? I hope not, but these are unfortunately the facts of life as we know it in the cyber world and it is only going to get worse. If you get a Ransomware attack from a phishing email less than 50% of companies who pay get their data back and also open themselves up to further attacks as they are willing to pay. Anyone wanting to start a phishing campaign </span><span style="font-size:18px;">doesn't</span><span style="font-size:18px;">&nbsp;have to be very technical nowadays as they can buy a campaign for $200 or so on the Dark Web. 91% of data breaches start from a spear phishing attack and you can do something to make sure it doesn't impact you.</span><br></p><p><span style="color:inherit;"></span></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;"><br></span></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">You will have heard about the need to create a multi-layered approach to Data and Cyber Security, in fact I am always trying to preach that! That layering system is not just about having firewalls, Anti-Virus and all the other bits, it's also about training your users and letting them know how to deal with a suspicious email.</span></p><div><div><br><span style="color:inherit;font-size:18px;">The criminals see your users as low-hanging fruit. Give your users the tools to fight back by training them in what red flags to keep an eye out for, keep their training up to date as cyber criminals are finding new ways to try and get at you everyday. This way you are turning that low-hanging fruit into a Human Firewall!</span><br></div></div></div>
</div></div><div data-element-id="elm_xKvZkRldtdSSJoOeKmsjiQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_xKvZkRldtdSSJoOeKmsjiQ"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Shameless Plug Warning!</span></h4></div>
<div data-element-id="elm_ByIDjBt1qQBQ_TGO3NuzqQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ByIDjBt1qQBQ_TGO3NuzqQ"].zpelem-text { color:#012a53 ; border-radius:1px; } [data-element-id="elm_ByIDjBt1qQBQ_TGO3NuzqQ"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#012a53 ; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div>Yes we do sell <a href="/security-awareness-training" title="Security Awareness Training" target="_blank">Security Awareness Training</a> and you will be pleasantly surprised how inexpensive it is and the ROI! Contact us for a demo and a quote.</div></div><p><span style="color:inherit;"><br></span></p><div><div>You can run a free phishing email test with up to 100 emails addresses on the same domain to see how it works along with other fantastic tools! Check out the <a href="/free-tools" title="FREE Tools" target="_blank">FREE Tools</a></div></div><p><br></p><p>Be safe out there!</p></div>
</div><div data-element-id="elm_lTm3kZqEhYGh2ya0U2bfNw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_lTm3kZqEhYGh2ya0U2bfNw"].zpelem-text { color:#012a53 ; border-radius:1px; } [data-element-id="elm_lTm3kZqEhYGh2ya0U2bfNw"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#012a53 ; } </style><div class="zptext zptext-align-left " data-editor="true"><p>#thinkb4uclick #mssp #managedsecurityservices</p></div>
</div><div data-element-id="elm_W-KFp_XDSyqVOq0ShRYknQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_W-KFp_XDSyqVOq0ShRYknQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 24 Feb 2020 10:26:00 +0000</pubDate></item></channel></rss>