<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.actisofttechnology.com/blogs/tag/ceo-fraud/feed" rel="self" type="application/rss+xml"/><title>ActiSoft Technology - Blog #CEO Fraud</title><description>ActiSoft Technology - Blog #CEO Fraud</description><link>https://www.actisofttechnology.com/blogs/tag/ceo-fraud</link><lastBuildDate>Thu, 23 Apr 2026 13:20:03 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Top Cyber Threats to SMEs]]></title><link>https://www.actisofttechnology.com/blogs/post/top-cyber-threats-to-smes-in-2022....and-more-than-likely-beyond</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-479801072 -1-.jpg"/>If you’re running a small to medium sized business, it’s easy to think that you might not be a big enough fish to attract the interest of cyber crimin ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_1vqchQpK6wvaX1moa5UKrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1vqchQpK6wvaX1moa5UKrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div>If you’re running a small to medium sized business, it’s easy to think that you might not be a big enough fish to attract the interest of cyber criminals. But the truth is, small organisations are just as much at risk of hacks and other security threats as huge corporations – in fact, being smaller may make you more of a target.&nbsp;</div><br><div>Attackers are targeting thousands of businesses every day, and those with less robust defences in place make much easier prey than bigger organisations who can invest more time and money into cyber security.&nbsp;</div><br><div><div>Hackers also love <a href="https://www.webroot.com/blog/2022/02/10/3-reasons-we-forget-small-midsized-businesses-are-major-targets-for-ransomware/" title="targeting small businesses" target="_blank" rel="">targeting small businesses</a> because they often deal with large sums of money and have great contacts – which means there’s lots of lovely data to steal.</div></div><br><div>It's often said that knowledge is power, and that’s certainly true when it comes to cyber-crime. The owners and managers of SMEs need to be aware of the risks, which is why we’ve put together this short article outlining the most common cyber-attacks right now and what we have seen.</div></div></div></div>
</div><div data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width: 500px ; height: 531.41px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:531.41px ; } } @media (max-width: 767px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:531.41px ; } } [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/compliance-manager" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-679718274.jpg" width="500" height="531.41" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;font-weight:400;">1) Phishing&nbsp;</span></div><br><div><span style="font-size:18px;">By far the most prevalent – and damaging – threat facing small and medium sized businesses in 2022 is phishing. These attacks account for 90% of all breaches; a figure that’s grown by 65% since 2021. Phishing attacks are when a hacker sends an email pretending to be from trusted contact, tricking the recipient to click on a malicious link, download a code or share sensitive information. There are several types of phishing attacks you need to know about:</span></div><br><div><ul><li><span style="font-size:18px;">The spray and pray approach, which is where hackers send out thousands of emails all at once, in the hope that one or two will bite</span></li><li><span style="font-size:18px;">Spear phishing: a campaign that targets a particular person or organisation and includes information which is known to be of interest to the specific target</span></li><li><span style="font-size:18px;">Whaling: an even more targeted and carefully executed attack, where the hacker goes after a specific C level executive in the organisation&nbsp;</span></li></ul></div><br><div><span style="font-size:18px;">Phishing attacks are becoming increasingly sophisticated, which means that even if you think you’ve seen it all before, you could still be caught out.</span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div><div data-element-id="elm_F66Pi-ivj0C7En0OG3Hcyg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_F66Pi-ivj0C7En0OG3Hcyg"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_F66Pi-ivj0C7En0OG3Hcyg"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_F66Pi-ivj0C7En0OG3Hcyg"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_9JxxX_lP0mzNVkOLHdgnWg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_9JxxX_lP0mzNVkOLHdgnWg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_nxxtnEMDQWtSWQqlzIINsg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nxxtnEMDQWtSWQqlzIINsg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA"] .zpimagetext-container figure img { width: 500px ; height: 333.56px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } @media (max-width: 767px) { [data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } [data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-693352614.jpg" width="500" height="333.56" loading="lazy" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">2) Ransomware&nbsp;</span></div><br><div><span style="font-size:18px;">Ransomware is a type of malicious software which prevents or restricts users from accessing their computer systems and data, commonly by locking their screens and/or files until they pay a ransom. Like other cyber-attacks, ransomware technology has become more sophisticated over recent years. A popular attack at the moment is a breed of ransomware known as “cryptoransomware” where files are encrypted and users are forced to send an online payment in return for a decryption code.</span></div><br><div><span style="font-size:18px;">Hackers will push for payments in all sorts of ways, though. The costs vary according to the type of ransomware being used and different exchange rates. Users are often asked to pay their ransoms in bitcoin, because it offers a greater level of anonymity, but hackers also list alternative options such as Amazon gift cards or iTunes vouchers. Sometimes it seems like an easy option to just pay up, but it should be noted that paying the ransom is no guarantee your files will be returned.</span></div></div></div></div>
</div></div><div data-element-id="elm_yXBiAnjFZGHyul8TiuG0JQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_yXBiAnjFZGHyul8TiuG0JQ"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_yXBiAnjFZGHyul8TiuG0JQ"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_yXBiAnjFZGHyul8TiuG0JQ"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div><div data-element-id="elm_OskkLb6t4OhaCYamgKZmvA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width: 500px ; height: 333.56px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } @media (max-width: 767px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-621493344.jpg" width="500" height="333.56" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">3) Social Engineering&nbsp;</span></div><br><div><div><span style="font-size:18px;">Social engineering <a href="https://blog.knowbe4.com/we-do-not-talk-enough-about-social-engineering-and-its-hurting-us" title="plays a huge role" target="_blank" rel="">plays a huge role</a> in cyber-crime. Even though advances in technology have been behind more sophisticated attacks, those attacks can only be properly deployed by a human. So, hackers work hard to understand how people think and manipulate them into making security mistakes or sharing valuable data. Social engineering happens in several phases. First, the hacker investigates their victim and identifies any weaknesses in their security systems. Next they start to gain their trust, either by sharing information the victim might be interested in or by pretending to be a trusted contact. Then, when the target lets their guard down and begins to trust the hacker, they’ll go in for the kill.&nbsp;</span></div></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_qzZGWuwaDuQcUCQy2nRgiw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_qzZGWuwaDuQcUCQy2nRgiw"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_qzZGWuwaDuQcUCQy2nRgiw"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_qzZGWuwaDuQcUCQy2nRgiw"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA"] .zpimagetext-container figure img { width: 500px ; height: 374.82px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } @media (max-width: 767px) { [data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } [data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-1323852923.jpg" width="500" height="374.82" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">4) Insider Threat&nbsp;</span></div><br><div><div><span style="font-size:18px;">Insider threats are posed by individuals from inside an organisation. This can include current or previous staff members, partners and contractors with access to passwords and company data. These individuals may act maliciously, intentionally stealing data or infiltrating systems for personal gain, but often they’re completely unwitting. Lack of awareness about cyber security issues can turn the most diligent worker into an insider threat, so it’s important to have robust policies and training measures in place.&nbsp;</span></div></div></div></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_GMwyye_Bz97zQF2TfOLKTQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_GMwyye_Bz97zQF2TfOLKTQ"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_GMwyye_Bz97zQF2TfOLKTQ"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_GMwyye_Bz97zQF2TfOLKTQ"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA"] .zpimagetext-container figure img { width: 300px !important ; height: 250px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA"] .zpimagetext-container figure img { width:300px ; height:250px ; } } @media (max-width: 767px) { [data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA"] .zpimagetext-container figure img { width:300px ; height:250px ; } } [data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/PET-300x250.jpg" width="300" height="250" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div><div style="color:inherit;"><div><span style="font-size:24px;">5) Shadow IT</span></div>
<br><div><span style="font-size:18px;">Shadow IT is a term covering the use of different IT systems, apps, services and devices that haven’t been approved by an IT department. Since Cloud services have become more popular, and also since the first lockdown, the use of Shadow IT has grown exponentially. New technology drives innovation and can deliver huge cost and time savings, but without the right security measures in place it also poses a huge risk. </span></div>
<br><div><br></div></div></div></div></div></div></div></div></div></div></div><div><div style="color:inherit;"></div>
</div></div></div></div></div><div data-element-id="elm_YMPka8PIM1yThWWIy9D0NA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_YMPka8PIM1yThWWIy9D0NA"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_YMPka8PIM1yThWWIy9D0NA"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_YMPka8PIM1yThWWIy9D0NA"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw"] .zpimagetext-container figure img { width: 500px ; height: 374.82px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } @media (max-width: 767px) { [data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } [data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-864427926.jpg" width="500" height="374.82" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">6) Software Exploits</span></div><br><div><div><span style="font-size:18px;">A software exploit is a code that’s been written to take advantage of a particular vulnerability or flaw in a piece of software. Although security professionals sometimes develop these exploits as evidence of vulnerabilities, they’re also widely used by hackers with malicious intent.&nbsp;</span></div></div><br><div><br></div></div></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_rxlNLk2J77PSfK5fUmonSw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rxlNLk2J77PSfK5fUmonSw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">The purpose of this article is to provide you with an overview of the most common threats to your organisation. We’ll go into more detail about each type (and a few others!) in our next articles. In the meantime, if you want to know more about how to protect your SME from cyber threats, get in touch!</span><br></p></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Are your users putting a big target on your organisation’s back?</span><br></h2></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div>Cybercriminals are constantly coming out with new ways to hack into your network and steal your organisation’s confidential information.</div><div><br></div><div><div style="color:inherit;"><div><div><span style="font-weight:700;font-style:italic;">Find out if your users are putting a big target on your organisation’s back.</span></div></div><div><br></div><div><div><span style="font-weight:700;">KnowBe4’s new Password Exposure Test (PET)</span> is a complimentary IT security tool that allows you to run an in-depth analysis of your organisation’s hidden exposure risk associated with your users.</div></div><div><br></div><div><div>PET makes it easy for you to identify users with exposed emails publicly available on the web, and checks your Active Directory to see if they are using weak or compromised passwords that are part of a known data breach. PET then reports on any user accounts affected <span style="font-weight:700;">so you can take action immediately!</span></div></div></div></div></div></div></div>
</div><div data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width: 299px !important ; height: 254px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:299px ; height:254px ; } } @media (max-width: 767px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:299px ; height:254px ; } } [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Password%20Exposure%20Test%20Screen.png" width="299" height="254" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="font-weight:700;">Here's how it works:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><ul><li><span style="color:inherit;font-size:18px;">Checks to see if any of your organisations email addresses have been <span style="font-weight:700;">part of a data breach</span></span><br></li><li><span style="color:inherit;font-size:18px;">Tests against <span style="font-weight:700;">1</span><span style="font-weight:700;">0 types of weak password</span> related threats associated with user accounts</span><br></li><span style="font-size:18px;"><li><span style="color:inherit;"><span style="color:inherit;"><span style="color:inherit;">Checks against breached or weak passwords currently in <span style="font-weight:700;">use in your Active Directory</span><br></span></span></span></li><li><span style="color:inherit;"><span style="font-weight:700;">Reports on the accounts affected</span> and does not show/report on actual passwords</span><br></li><li><span style="color:inherit;"><span style="color:inherit;">Just download the install, run it, <span style="font-weight:700;">get results in minutes!</span><br></span></span></li></span></ul><ul></ul></div>
</div></div></div></div><div data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:700;font-size:20px;">Identify how many users take the bait and reply before the bad guys do!&nbsp;</span></div></div></div>
</div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Try It Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 10 Jun 2022 11:13:34 +0000</pubDate></item><item><title><![CDATA[Phishing Remains the Most Common Form of Attack]]></title><link>https://www.actisofttechnology.com/blogs/post/phishing-remains-the-most-common-form-of-attack</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Medium/iStock-836453798.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman Phishing attacks are “by far” the most common vector for data breaches, according to a new survey by ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_K181GJulRSeMPB2AjTWqEQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_K181GJulRSeMPB2AjTWqEQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dH7_4A98TlGro0W6gYV1_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_sWFAZGeUSj-cOjCo3l4yQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6SOucho61sNVozqQ9bxmug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6SOucho61sNVozqQ9bxmug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_d_G0oN8UqZlyifTibcx0gw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/iStock-679718274.jpg" size="medium" data-lightbox="true" style="width:573px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><div><a href="/what-is-phishing" title="Phishing" target="_blank" rel="">Phishing</a> attacks are “by far” the most common vector for data breaches, according to a new survey by the UK’s Department for Digital, Culture, Media, and Sport (DCMS).</div></div><p><br></p><div>“Among those that have identified breaches or attacks, around a quarter (27% of these businesses and 23% of these charities) experience them at least once a week,” the report states. “The most common by far are phishing attacks (for 83% and 79% respectively), followed by impersonation (for 27% and 23%). Broadly, these patterns around frequency and threat vectors are in line with the 2020 and 2019 results.”</div><div><br></div><div><span style="color:inherit;"><div>The DCMS says most of the respondents observed a noticeable increase in phishing attacks since the beginning of the pandemic.</div><div><br></div><div>“Among the organisations saying cyber security had become a higher priority under the pandemic, there were those that said that, in their case, the frequency of attacks had increased since March 2020 – especially phishing attacks,” the report says. “Others giving this response felt their organisations were more exposed to cyber risks now that their staff were working from home, because there were more endpoints to deal with and because they had less oversight of staff outside the office. In some cases where organisations had moved online to a greater extent following the lockdown, management boards had started paying more attention to cyber security as a business risk.”</div></span></div></div>
</div></div><div data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="small" data-lightbox="false" style="width:300px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><span style="color:inherit;"><div>The report found that only 20% of businesses said they conducted simulated phishing exercises for their employees, although respondents had a favourable view of risk assessments.</div><br><div></div><div>“In addition to their core purpose of identifying key risks, risk assessments were often viewed as a good way to produce evidence for management boards, which could be used to justify proposed cyber security actions or investment, or to show trends over time and whether things had improved,” the report says. “For example, one medium business carried out a mock phishing exercise as part of their risk assessment – they found that 15 per cent of staff responded to the mock phishing email, and presented these findings to the management board. This led to new user training on phishing emails, as well as other technical rule changes.”</div><div></div><br><div><div>New-school <a href="/security-awareness-training" title="security awareness training " target="_blank" rel="">security awareness training </a>with simulated phishing tests can help your employees thwart social engineering attacks.</div></div><div></div><br><div><div>The DCMS has the <a href="https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2021/cyber-security-breaches-survey-2021" title="story." target="_blank" rel="">story.</a></div></div></span></div>
</div></div><div data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Free&nbsp;<span style="font-weight:700;">Phishing Security Test</span></h2></div>
<div data-element-id="elm_KX3wsrBMkP502XIfnyFH9A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KX3wsrBMkP502XIfnyFH9A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Would your users fall for convincing phishing attacks? Take the first step now and find out before the bad guys do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.</div></div>
</div><div data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture3.png" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;font-weight:700;">Here's how it works:</span><br></p><div><ul><ul><li>Immediately start your test for up to 100 users (no need to talk to anyone)</li><li>Select from 20+ languages and customise the phishing test template based on your environment</li><li>Choose the landing page your users see after they click</li><li>Show users which red flags they missed, or a 404 page</li><li>Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management</li><li>See how your organisation compares to others in your industry</li></ul></ul></div>
</div></div></div><div data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Go Phishing Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 29 Mar 2021 13:33:05 +0000</pubDate></item><item><title><![CDATA[KPMG: Cyber Security Risk Is Now No. 1 Threat To Growth]]></title><link>https://www.actisofttechnology.com/blogs/post/kpmg-cyber-security-risk-is-now-no.-1-threat-to-growth</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.comhttps://images.unsplash.com/photo-1552533236-b76e85fca743?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=Mnw0NTc5N3wwfDF8c2VhcmNofDR8fGJ1c2luZXNzJTIwcmlza3xlbnwwfHx8fDE2MTY2ODY1OTE&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman KPMG in the UK just released their CEO 2021 Outlook Pulse Survey where glo ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_K181GJulRSeMPB2AjTWqEQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_K181GJulRSeMPB2AjTWqEQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dH7_4A98TlGro0W6gYV1_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_dH7_4A98TlGro0W6gYV1_Q"].zprow{ border-radius:1px; } </style><div data-element-id="elm_sWFAZGeUSj-cOjCo3l4yQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_sWFAZGeUSj-cOjCo3l4yQg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6SOucho61sNVozqQ9bxmug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6SOucho61sNVozqQ9bxmug"].zpelem-text { border-radius:1px; margin-block-start:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_Ck3G1d6pwMblFmBZYtZ7uA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Ck3G1d6pwMblFmBZYtZ7uA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div> KPMG in the UK just released their CEO 2021 Outlook Pulse Survey where global leaders were asked about their 3-year outlook.&nbsp; CEOs of the world’s most influential companies are planning what a return to ‘normal’ will look like. Nearly half (45 percent) expect normality to resume in 2022, with only one-third (31 percent) anticipating a return to normal in 2021. Significantly, 24 percent of leaders say that their business has changed forever. </div>
<p><br></p><div><div>When asked:&nbsp; <span style="font-weight:700;">Which of the following risks poses the greatest threat to your organisation's growth over the next 3 years?</span> the following graph was published. Note the change from position 5 in 2020 to position 1 in 2021:&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</div></div>
</div></div><div data-element-id="elm_eG1er8aqQ48uTY1opF-7lQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_eG1er8aqQ48uTY1opF-7lQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_YUZuEc16m5fuaKPHIDzbEg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-9 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_YUZuEc16m5fuaKPHIDzbEg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6cxITlYs6ZPpcf1gtm4P5A" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_6cxITlYs6ZPpcf1gtm4P5A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://home.kpmg/uk/en/home/insights/2020/09/uk-ceo-outlook.html" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture1-1.png" size="original"/></picture></a></figure></div>
</div></div><div data-element-id="elm_piwnLiHA0tf38vn2zecWEw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_piwnLiHA0tf38vn2zecWEw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_hgLIrHhWhQzClhyGSRx31A" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_hgLIrHhWhQzClhyGSRx31A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="small" style="width:300px;"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_Aqm2YA-PfpFt66Hud7v1sg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Aqm2YA-PfpFt66Hud7v1sg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>The full article is highly recommended. Here is a link to the KPMG site with the complete&nbsp; survey results:</div><p><br></p><div><div><a href="https://home.kpmg/uk/en/home/insights/2020/09/uk-ceo-outlook.html" title="https://home.kpmg/uk/en/home/insights/2020/09/uk-ceo-outlook.html" target="_blank" rel="">https://home.kpmg/uk/en/home/insights/2020/09/uk-ceo-outlook.html</a></div></div></div>
</div><div data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Get Your&nbsp;<span style="font-weight:700;">CEO Fraud Prevention Manual</span></h2></div>
<div data-element-id="elm_6ILHK0LS5iBejG-H2I6Sgw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_6ILHK0LS5iBejG-H2I6Sgw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_IUgGdw5HTOvwEAIee8CRkg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_IUgGdw5HTOvwEAIee8CRkg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_fbCMlIsfU0h2iL9jSa88-A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_fbCMlIsfU0h2iL9jSa88-A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">CEO fraud has ruined the careers of many executives and loyal employees, causing over $26 billion in losses. Don’t be the next victim. This manual provides a thorough overview of how executives are compromised, how to prevent such an attack and what to do if you become a victim.</span><br></p></div>
</div></div><div data-element-id="elm_vcoHv0TPSqcH1troVJLhAA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vcoHv0TPSqcH1troVJLhAA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_WykhyEXIbsWetYBfphCmPQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_WykhyEXIbsWetYBfphCmPQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://forms.zohopublic.eu/actisofttechnologycom/form/CEOFraudPreventionManual/formperma/whtiWN4rVXw7uGo_frJIG9N8AyOoV4_0hX7_IQltdMg" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture2.jpg" size="small" style="width:300px;"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://forms.zohopublic.eu/actisofttechnologycom/form/CEOFraudPreventionManual/formperma/whtiWN4rVXw7uGo_frJIG9N8AyOoV4_0hX7_IQltdMg" target="_blank"><span class="zpbutton-content">Get Your Manual</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 25 Mar 2021 15:36:45 +0000</pubDate></item><item><title><![CDATA[The Most Commonly Spoofed Business-Related Applications in a Phishing Campaign]]></title><link>https://www.actisofttechnology.com/blogs/post/the-most-commonly-spoofed-business-related-applications-in-a-phishing-campaign</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Medium/iStock-627319476.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman Business-related applications like Zoom, Microsoft, and DocuSign are the most commonly spoofed servic ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_K181GJulRSeMPB2AjTWqEQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_K181GJulRSeMPB2AjTWqEQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dH7_4A98TlGro0W6gYV1_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_sWFAZGeUSj-cOjCo3l4yQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6SOucho61sNVozqQ9bxmug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6SOucho61sNVozqQ9bxmug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_d_G0oN8UqZlyifTibcx0gw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/Picture1.jpg" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">Business-related applications like Zoom, Microsoft, and DocuSign are the most commonly spoofed services in phishing attacks, according to a new report from GreatHorn. Business apps made up 45% of all impersonation&nbsp;<a href="/what-is-phishing" title="phishing" target="_blank" rel="">phishing</a>&nbsp;attacks. Social media-related phishing attacks accounted for 34% of attacks, while consumer services like Amazon and PayPal made up 20%.</span></p><p><span style="color:inherit;"><br></span></p><div><span style="color:inherit;"><p style="margin-bottom:20px;">The researchers also found that while the total volume of daily phishing attempts has decreased compared to last year, the number of successful phishing attacks has increased. The researchers attribute this to attackers getting better at the social engineering aspect, as well as getting their emails past security filters.</p><div><span style="color:inherit;">“Though daily occurrences of phishing attacks have decreased from 36% to 25% between 2020 and 2021, weekly and monthly phishing attacks have increased from 28% to 42% and 11% to 17%, respectively,” GreatHorn says. “These attacks are increasingly difficult to detect as cybercriminals become more sophisticated and targeted in their attacks – advancing beyond the ‘batch and blast’ methodology to social engineering phishing campaigns. As a result of this, the quantity of phishing attempts being experienced by organisations may have decreased daily, but the impact of those campaigns that bypass traditional email security is increasing. As a result of increasing attacks, email security has risen to one of the top 3 IT security projects for 2021 among the organisations surveyed.</span></div></span></div></div>
</div></div><div data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="small" data-lightbox="false" style="width:300px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><span style="color:inherit;"><div> The researchers note that a primary concern of most respondents regarding email security products was that the product would miss phishing attacks. </div><br><div></div>
<div> “Missing phishing attacks remains the top issue in current email security solutions with 39% of respondents noting this as a top concern in both 2020 and 2021,” the researchers write. They add, “Fewer organisations report being ‘satisfied’ with their current email security solution, decreasing from 76% in 2020 to 53% in 2021. On the other hand, organisations reporting their email security solution was ‘good enough’ increased from 19% in 2020 to 36% in 2021.” </div>
<div></div><br><div><div><a href="/security-awareness-training" title="New-school security awareness training" target="_blank" rel="">New-school security awareness training</a> can provide your organisation with an essential layer of defence by teaching your employees how to recognise phishing attacks. </div>
</div><div></div><br><div><div>GreatHorn has the full <a href="https://www.greathorn.com/company/press-releases/business-related-applications-are-the-most-frequently-impersonated-over-email-by-cybercriminals-spoofed-more-regularly-than-consumer-and-social-applications/" title="story.&nbsp;" target="_blank" rel="">story.&nbsp;</a></div></div></span></div>
</div></div><div data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Free&nbsp;<span style="font-weight:700;">Phishing Security Test</span></h2></div>
<div data-element-id="elm_KX3wsrBMkP502XIfnyFH9A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KX3wsrBMkP502XIfnyFH9A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Would your users fall for convincing phishing attacks? Take the first step now and find out before the bad guys do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.</div></div>
</div><div data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture3.png" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;font-weight:700;">Here's how it works:</span><br></p><div><ul><ul><li>Immediately start your test for up to 100 users (no need to talk to anyone)</li><li>Select from 20+ languages and customise the phishing test template based on your environment</li><li>Choose the landing page your users see after they click</li><li>Show users which red flags they missed, or a 404 page</li><li>Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management</li><li>See how your organisation compares to others in your industry</li></ul></ul></div>
</div></div></div><div data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Go Phishing Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 16 Mar 2021 18:20:43 +0000</pubDate></item><item><title><![CDATA[A Hacker Is Selling Access To The Email Accounts Of Hundreds Of C-Level Executives]]></title><link>https://www.actisofttechnology.com/blogs/post/a-hacker-is-selling-access-to-the-email-accounts-of-hundreds-of-c-level-executives</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-954712690.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman ZDNet's Zero Day column just reported one of the best reasons why you sh ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_3Cy6pD-xR72mR5jNB9mQ1A" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_d7IjBOiYTZySFuzvFAZdvg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_IBI7XLf7TSSy97jVR5Mhqw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_bDNBZXuAY3pQbwsCl5E_FA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_bDNBZXuAY3pQbwsCl5E_FA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><p><span style="font-size:14px;">Written by Stu Sjouwerman</span><br></p></div>
</div><div data-element-id="elm_pTQtRM8bRJGC4_8FKZAqJw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_pTQtRM8bRJGC4_8FKZAqJw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Great for Marketing Purposes and for Phishing!</h2></div>
<div data-element-id="elm_qVyB3KifLDH3rt_akc6I4g" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_qVyB3KifLDH3rt_akc6I4g"] .zpimagetext-container figure img { width: 500px ; height: 331.25px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_qVyB3KifLDH3rt_akc6I4g"] .zpimagetext-container figure img { width:500px ; height:331.25px ; } } @media (max-width: 767px) { [data-element-id="elm_qVyB3KifLDH3rt_akc6I4g"] .zpimagetext-container figure img { width:500px ; height:331.25px ; } } [data-element-id="elm_qVyB3KifLDH3rt_akc6I4g"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/57e5d4454950a514f6da8c7dda79367f103cd9ed55536c48732f7ddc954cc559bd_1280.jpg" width="500" height="331.25" loading="lazy" size="medium" data-lightbox="true" style="width:1280px !important;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><div>ZDNet's Zero Day column just reported one of the best reasons why you should step your users through <a href="/security-awareness-training" title="new-school security awareness training" target="_blank" rel="">new-school security awareness training</a> yet:</div>
</div><p><br></p><div>&quot;A threat actor is currently selling passwords for the email accounts of hundreds of C-level executives at companies across the world. The data is being sold on a closed-access underground forum for Russian-speaking hackers named Exploit.in, ZDNet has learned this week.&nbsp; The threat actor is selling email and password combinations for Office 365 and Microsoft accounts, which he claims are owned by high-level executives occupying functions such as:</div>
</div></div></div><div data-element-id="elm_vPS2FUdLnb2dAVzB7s8HnQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_vPS2FUdLnb2dAVzB7s8HnQ"] .zpimagetext-container figure img { width: 300px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_vPS2FUdLnb2dAVzB7s8HnQ"] .zpimagetext-container figure img { width:300px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_vPS2FUdLnb2dAVzB7s8HnQ"] .zpimagetext-container figure img { width:300px ; height:600px ; } } [data-element-id="elm_vPS2FUdLnb2dAVzB7s8HnQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" title="Book a Demo!" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" width="300" height="600" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;"></span></p><ul><ul><li>CEO - chief executive officer</li><li>COO - chief operating officer</li><li>CFO - chief financial officer or chief financial controller</li><li>CMO - chief marketing officer</li><li>CTOs - chief technology officer</li><li>President</li><li>Vice president</li><li>Executive Assistant</li><li>Finance Manager</li><li>Accountant</li><li>Director</li><li>Finance Director</li><li>Financial Controller</li><li>Accounts Payable</li></ul></ul></div>
</div></div><div data-element-id="elm_LR6-vUFBWth14o56nO-CCA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LR6-vUFBWth14o56nO-CCA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="color:inherit;"><div>Access to any of these accounts is sold for prices ranging from $100 to $1,500, depending on the company size and user's role. A source in the cyber-security community who agreed to contact the seller to obtain samples has confirmed the validity of the data and obtained valid credentials for two accounts, the CEO of a US medium-sized software company and the CFO of an EU-based retail store chain.</div><br><div>The source, which requested that ZDNet not use its name, is in the process of notifying the two companies, but also two other companies for which the seller published account passwords as public proof that they had valid data to sell. These were login details for an executive at a UK business management consulting agency and for the president of a US apparel and accessories maker.</div><br><div><div>I don't have to tell you the risks that this brings related to <a href="/what-is-ceo-fraud" title="CEO Fraud" target="_blank" rel="">CEO Fraud</a>, also known as Business Email Compromise. ZDNet has the <a href="https://www.zdnet.com/article/a-hacker-is-selling-access-to-the-email-accounts-of-hundreds-of-c-level-executives/" title="full story." target="_blank" rel="">full story.</a></div></div></span></div></div>
</div><div data-element-id="elm_4O5nf_I8W5ITNweKrSGxoQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4O5nf_I8W5ITNweKrSGxoQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Get Your <span style="font-weight:700;">CEO Fraud Prevention Manual</span></h2></div>
<div data-element-id="elm_DG2siLEIQ9a8lcfVE7HcyQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DG2siLEIQ9a8lcfVE7HcyQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">CEO fraud has ruined the careers of many executives and loyal employees, causing over $26 billion in losses. Don’t be the next victim. This manual provides a thorough overview of how executives are compromised, how to prevent such an attack and what to do if you become a victim.</span><br></p></div>
</div><div data-element-id="elm_q61azXnJQ-yb3kDjVydMjQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_q61azXnJQ-yb3kDjVydMjQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://forms.zohopublic.eu/actisofttechnologycom/form/CEOFraudPreventionManual/formperma/whtiWN4rVXw7uGo_frJIG9N8AyOoV4_0hX7_IQltdMg?referrername=kb4ceofraud_whitepaper" target="_blank" title="CEO Fraud Manual"><span class="zpbutton-content">Get Your Manual</span></a></div>
</div><div data-element-id="elm_5dkEERrHJoSP04toUSVAzg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5dkEERrHJoSP04toUSVAzg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Want to know and monitor the Dark Web for your organisations credentials? Check out our <a href="/domainwatch" title="DomainWatch" target="_blank" rel="">DomainWatch</a> service</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 01 Dec 2020 11:15:21 +0000</pubDate></item><item><title><![CDATA[The Geography of Business Emails Compromise]]></title><link>https://www.actisofttechnology.com/blogs/post/the-geography-of-business-emails-compromise</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/images/55e3dc434f53a414f6da8c7dda79367f103cd9ed55536c48732f7fd0964dc45db0_1280.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman Researchers at Agari have released a report on the global distribution of business email compromise ( ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_V_QaXgNTS3uGMKHKo2OVDw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_A4P9MBOIRrGrDzLT-tWmHA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_nM4d_UTQTy-1Q8Zqn9d2WQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Fy8OTJFRFwGgDAIMZwl3pA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Fy8OTJFRFwGgDAIMZwl3pA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:14px;">Blog courtesy of KnowBe4</span></p><p><span style="color:inherit;"></span></p><p><span style="font-size:14px;">Written by Stu Sjouwerman</span></p></div>
</div><div data-element-id="elm_eNQaOCRKnZhKxaOxMAEeFw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_eNQaOCRKnZhKxaOxMAEeFw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-622776790.jpg" size="small" data-lightbox="true" style="width:702px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;font-size:18px;">Researchers at Agari have released a report on the global distribution of business email compromise (BEC) actors, and determined that 25% of these criminals are operating from within the United States. This makes the US the second-largest hub for BEC actors in the world. Criminals in Nigeria still account for the vast majority of BEC attacks, at 50% of the global total. South Africa was third, with criminals there responsible for 9% of these attacks. Agari’s researchers based their findings on incidents in which the attackers failed to anonymise their real-world locations.</span><br></p></div>
</div></div><div data-element-id="elm_qOMWkDE4Q96R7fRG16Tusg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qOMWkDE4Q96R7fRG16Tusg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="text-align:left;">“A quarter of the BEC actors we identified globally were located in the US, operating in 45 states and the District of Columbia,” Agari says. “Nearly half these scammers were located in five states: California, Georgia, Florida, Texas, and New York Many of the BEC actors in our dataset were clustered around a handful of US cities. The largest of these were based in and around Atlanta, GA, with 7% of all US-based BEC actors operating in this metropolitan area.”</div><p style="text-align:left;"><br></p><div style="text-align:left;">The US government isn’t letting these actors operate unperturbed—the Justice Department has arrested dozens of people allegedly involved in these schemes. Still, the number of BEC attacks originating in the US is notable, considering that Europe only accounts for 6%, the Middle East for 4%, and the Asia-Pacific for 2%.</div><p style="text-align:left;"><br></p><div style="text-align:left;">“It’s well-known that organizations within the United States are preferred targets for BEC actors. Some groups our team has researched, such as Exaggerated Lion, have exclusively targeted US-based businesses, for instance. But it may be surprising to some that a quarter of all BEC actors operate from within the US.”</div><p style="text-align:left;"><br></p><div style="text-align:left;">Agari adds that BEC activity is on the rise in other countries as well.</div><p style="text-align:left;"><br></p><div style="text-align:left;">“Because of the impact of BEC attacks globally, law enforcement in Nigeria has become more aggressive in recent years, which has caused BEC actors to migrate to other countries,” the researchers write. “Additionally, the significant return on investment from BEC scams has led far more sophisticated Eastern European cybercrime groups, like Cosmic Lynx, to get into the game. This only increases the geographic distribution of BEC attack sources.”</div><div style="text-align:left;"><br></div><div style="text-align:left;"><span style="color:inherit;"><div><div>BEC attacks are extremely profitable, so criminals put a great deal of effort into refining their tactics. New-school <a href="/security-awareness-training" title="security awareness training" target="_blank" rel="">security awareness training</a> can help your employees thwart targeted <a href="/social-engineering" title="social engineering" target="_blank" rel="">social engineering</a> attacks.</div></div><div><br></div><div><div>Agari has the <a href="https://www.agari.com/cyber-intelligence-research/whitepapers/acid-agari-geography-of-bec.pdf" title="story." target="_blank" rel="">story.</a></div></div></span></div></div>
</div><div data-element-id="elm_tK8yINOrPhpNtREks1Ns7Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_tK8yINOrPhpNtREks1Ns7Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;"><span style="font-size:30px;">Get Your&nbsp;<strong>CEO Fraud Prevention Manual</strong></span></span></h2></div>
<div data-element-id="elm_bCdbvvXYSh9aiuSeua-q-w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_bCdbvvXYSh9aiuSeua-q-w"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://zfrmz.eu/JLTeKHYgnRz20VWzPiAx" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/KB4%20CEO%20Fraud%20Prevention.png" size="small" data-lightbox="false" style="width:656px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">CEO fraud has ruined the careers of many executives and loyal employees, causing over $26 billion in losses. Don’t be the next victim. This manual provides a thorough overview of how executives are compromised, how to prevent such an attack and what to do if you become a victim.</span><br></p></div>
</div></div><div data-element-id="elm_lEp-uv4gTCuhNq9j3EWXoA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_lEp-uv4gTCuhNq9j3EWXoA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://zfrmz.eu/JLTeKHYgnRz20VWzPiAx" target="_blank"><span class="zpbutton-content">Get Your Manual</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 03 Nov 2020 13:32:08 +0000</pubDate></item></channel></rss>