SlideShare a Scribd company logo
1 of 1
Download to read offline
top tips to protect your
organisation from
Business Email Compromise
£ 260k
£ 520k
£ 700k
£ 960k £ 960k £ 960k
£ 1.31
million
£ 1.52
million
£ 1.57
million
MalwareBotnets Ransomware Stolen
devices
Phishing Malicious
code
Malicious
insiders
DoS
attacks
Web-based
attacks
Over the last five years the
average cost of cyber crime
for UK organisations has
risen by 62%
The UK’s 5.4 million
small businesses are
collectively attacked
more than
times a year
million
£25,700
is the average cost of cyber crime to small
UK-based businesses in 2017 in direct costs
(i.e. ransoms paid and hardware replaced)
before indirect costs like reputational
damage and the impact of losing customers
are identified
52%of UK small businesses have no
cyber security strategy in place, yet
more than 2,000 cybercrimes were
reported by businesses in 2018
affecting thousands of customers
What is Business
Email Compromise?
Business Email Compromise is where a cyber attacker gains access to a
corporate email account - usually by copying or ‘spoofing’ the owner’s identity.
On the basis that the emails they receive look genuine, employees and
customers can be defrauded by an action encouraged by a fraudulent email –
usually involving the transfer of money to the attacker’s account.
Businesses can also be hit by phishing attacks – where scammers send fake
emails asking for sensitive information. They might try to trick the recipient
into revealing bank details or sending money. Scammers have moved on from
the clearly fake African prince asking for your help in unlocking his ‘fortune’
and business email fraud is now way more sophisticated, convincing and
difficult to spot.
And to make matters worse, many email compromises aren’t spotted until
some time has elapsed – leaving the hacker free reign to work undetected
within a victim’s email system.
Forbes put BEC (Business
Email Compromise) and
phishing attacks as their top
cyber security trend for
2019
BEC attacks were up by 297%across 2018
What can you do about it?
Better employee awareness and training – build a ‘think cyber security’ culture.
Train people to look for signs of suspicious activity. Look out for poorly written
emails, those sent from a mobile, using wrong signature lines, etc.
Put in place a process that doesn’t rely on email to verify unusual financial or
sensitive data requests – by standard non-email channels. You can even call
colleagues to check using the phone – remember how we used to talk to each
other?
Introduce 2 Factor Authentication. This is an extra layer of security that
requires not only a password and username but also something that the user has on
them. A common example is a text message containing an additional password. Due
to the increasing number of incidents we are seeing across all clients, our advice
would be that you should introduce this as mandatory across all of your staff, whilst
understanding that there might be some downsides and inconveniences of
implementing this. It can be irritating always having to cross check, but we consider
this a small price to pay for safeguarding your private information.
Introduce password managers – and a good password policy. A password
manager like 1Password can help to ensure your staff don’t use the same
password more than once and so help ensure that an account that is breached
is not used to access other un-related accounts.
Stop using lazy passwords! Believe it or not, the most hacked passwords seem to be
the same each year such as ‘StarWars’, ‘1234’ or ‘QWERTY’. Passwords that are actually
password phrases are even harder to crack, especially combined with numbers:
“20peterandjanewenttothecinema19” etc.
Spoof phishing attack training. We partner with a security specialist called
KnowBe4 and a number of our clients have taken up this service which allows
us to setup spoof phishing attacks on staff so that we can spot who is most
likely to be susceptible and provide mandatory training for staff to help them
to identify the threats.
Ensure DMARC, DKIM and SPF are all defined for your email domain. DMARC,
which stands for Domain-based Message Authentication, Reporting & Conformance,
is a standard that helps email users ensure that the messages they receive are from a
recognised source. Read more in our blog “Improve your email safety with DMARC”.
These cybersecurity practices are essential, but they can be fairly difficult to implement and
Stellarise is here to help. As one of the UK’s leading managed services providers, we provide
state-of-the-art security systems and comprehensive security training for our clients.
A combination of better awareness, common sense and workplace training is a
good place to start, such as:
SOURCES:
“The cost of a cyber attack”, 2018, IT Governance
https://www.itgovernance.co.uk/blog/the-cost-of-a-cyber-attack
“UK Small businesses targeted with 65,000 attempted cyber attacks per day”, 2018, Hiscox
https://www.hiscoxgroup.com/news/press-releases/2018/18-10-18
“SMBs could be the key to stopping UK data breaches”, 2019, TechRadar
https://www.techradar.com/uk/news/smbs-could-be-the-key-to-stopping-uk-data-breaches
“Five Cybersecurity trends to watch for in 2019”, 2019, Forbes
https://www.forbes.com/sites/forbestechcoucil/2019/02/07/five-cybersecurity-trends-to-watch-for-in-2019/
Graphics by Fullvector, Freepik
https://www.freepik.com/fullvector
Based in London and Budapest, Stellarise have extensive experience addressing cyber
security and risk-related issues in a variety of industries. With a comprehensive stack
of smart and innovative technology, we work with our clients to develop and maintain
effective and efficient cyber security solutions that support businesses across the UK.
From strategy to implementation, we are ready to help you - get in touch to discuss the
threats and issues affecting your business.
https://stellarise.com/
020 3137 3550
hello@stellarise.com
54 Maltings Place
169 Tower Bridge Road
London
SE1 3LJ
Kálvin tér
II. floor 8/b
1053
Budapest
The cost for the UK organisations to resolve a cyber attack per type in 2017
AboutStellarise
Contact
Strategic partners for IT and growth

More Related Content

What's hot

Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Entersoft Security
 
Dmarc is your savior
Dmarc is your saviorDmarc is your savior
Dmarc is your saviorTIKAJ
 
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based AttacksESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based AttacksProofpoint
 
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012Charmaine Servado
 
Proofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint
 
UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013Martin Jordan
 
Securing Real Estate Transactions through Threat Intelligence
Securing Real Estate Transactions through Threat IntelligenceSecuring Real Estate Transactions through Threat Intelligence
Securing Real Estate Transactions through Threat IntelligenceInman News
 
Infographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threatsInfographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threatsProofpoint
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Wavecrest Computing
 
Cyber security
Cyber securityCyber security
Cyber securityJoseMerda1
 
Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesΔρ. Γιώργος K. Κασάπης
 
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerWhy Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerDigital Transformation EXPO Event Series
 
Secure Cloud For Legal Professionals
Secure Cloud For Legal ProfessionalsSecure Cloud For Legal Professionals
Secure Cloud For Legal ProfessionalsZitaAdlTrk
 
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeNearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeprcircle
 
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response ConferenceLindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response ConferenceStarttech Ventures
 
Trust It Mini Public
Trust It Mini PublicTrust It Mini Public
Trust It Mini PublicTrust_IT
 
Cyber security training course ppt
Cyber security training course pptCyber security training course ppt
Cyber security training course pptRajshekarShivanagutt
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSPaul Walsh
 

What's hot (20)

Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
Dmarc is your savior
Dmarc is your saviorDmarc is your savior
Dmarc is your savior
 
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based AttacksESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
 
Gone Phishing
Gone Phishing Gone Phishing
Gone Phishing
 
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
 
Proofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat Report
 
UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013
 
Securing Real Estate Transactions through Threat Intelligence
Securing Real Estate Transactions through Threat IntelligenceSecuring Real Estate Transactions through Threat Intelligence
Securing Real Estate Transactions through Threat Intelligence
 
Infographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threatsInfographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threats
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequencies
 
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerWhy Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
 
Secure Cloud For Legal Professionals
Secure Cloud For Legal ProfessionalsSecure Cloud For Legal Professionals
Secure Cloud For Legal Professionals
 
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeNearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
 
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response ConferenceLindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Trust It Mini Public
Trust It Mini PublicTrust It Mini Public
Trust It Mini Public
 
Cyber security training course ppt
Cyber security training course pptCyber security training course ppt
Cyber security training course ppt
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMS
 

Similar to 7 top tips to protect your business from BEC [infographic] By Stellarise

Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCUsing Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCReturn Path
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrimethinkwithniche
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowShantam Goel
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...IRJET Journal
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LAUsing Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LAReturn Path
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Return Path
 
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businessesntoscano50
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your BusinessIndusfacePvtLtd
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023incmagazineseo
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfMr. Business Magazine
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber WarfareSwapnil Jagtap
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB'sGuise Bule
 
How to Protect Your Business from Cyber Threats | The Entrepreneur Review
How to Protect Your Business from Cyber Threats | The Entrepreneur ReviewHow to Protect Your Business from Cyber Threats | The Entrepreneur Review
How to Protect Your Business from Cyber Threats | The Entrepreneur ReviewTheEntrepreneurRevie
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityNiamh Hughes
 

Similar to 7 top tips to protect your business from BEC [infographic] By Stellarise (20)

Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCUsing Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LAUsing Return Path Data to Protect Your Brand: Security Breakout Session - LA
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
 
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businesses
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdf
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
How to Protect Your Business from Cyber Threats | The Entrepreneur Review
How to Protect Your Business from Cyber Threats | The Entrepreneur ReviewHow to Protect Your Business from Cyber Threats | The Entrepreneur Review
How to Protect Your Business from Cyber Threats | The Entrepreneur Review
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber security
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cyber threat forecast 2018..
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

7 top tips to protect your business from BEC [infographic] By Stellarise

  • 1. top tips to protect your organisation from Business Email Compromise £ 260k £ 520k £ 700k £ 960k £ 960k £ 960k £ 1.31 million £ 1.52 million £ 1.57 million MalwareBotnets Ransomware Stolen devices Phishing Malicious code Malicious insiders DoS attacks Web-based attacks Over the last five years the average cost of cyber crime for UK organisations has risen by 62% The UK’s 5.4 million small businesses are collectively attacked more than times a year million £25,700 is the average cost of cyber crime to small UK-based businesses in 2017 in direct costs (i.e. ransoms paid and hardware replaced) before indirect costs like reputational damage and the impact of losing customers are identified 52%of UK small businesses have no cyber security strategy in place, yet more than 2,000 cybercrimes were reported by businesses in 2018 affecting thousands of customers What is Business Email Compromise? Business Email Compromise is where a cyber attacker gains access to a corporate email account - usually by copying or ‘spoofing’ the owner’s identity. On the basis that the emails they receive look genuine, employees and customers can be defrauded by an action encouraged by a fraudulent email – usually involving the transfer of money to the attacker’s account. Businesses can also be hit by phishing attacks – where scammers send fake emails asking for sensitive information. They might try to trick the recipient into revealing bank details or sending money. Scammers have moved on from the clearly fake African prince asking for your help in unlocking his ‘fortune’ and business email fraud is now way more sophisticated, convincing and difficult to spot. And to make matters worse, many email compromises aren’t spotted until some time has elapsed – leaving the hacker free reign to work undetected within a victim’s email system. Forbes put BEC (Business Email Compromise) and phishing attacks as their top cyber security trend for 2019 BEC attacks were up by 297%across 2018 What can you do about it? Better employee awareness and training – build a ‘think cyber security’ culture. Train people to look for signs of suspicious activity. Look out for poorly written emails, those sent from a mobile, using wrong signature lines, etc. Put in place a process that doesn’t rely on email to verify unusual financial or sensitive data requests – by standard non-email channels. You can even call colleagues to check using the phone – remember how we used to talk to each other? Introduce 2 Factor Authentication. This is an extra layer of security that requires not only a password and username but also something that the user has on them. A common example is a text message containing an additional password. Due to the increasing number of incidents we are seeing across all clients, our advice would be that you should introduce this as mandatory across all of your staff, whilst understanding that there might be some downsides and inconveniences of implementing this. It can be irritating always having to cross check, but we consider this a small price to pay for safeguarding your private information. Introduce password managers – and a good password policy. A password manager like 1Password can help to ensure your staff don’t use the same password more than once and so help ensure that an account that is breached is not used to access other un-related accounts. Stop using lazy passwords! Believe it or not, the most hacked passwords seem to be the same each year such as ‘StarWars’, ‘1234’ or ‘QWERTY’. Passwords that are actually password phrases are even harder to crack, especially combined with numbers: “20peterandjanewenttothecinema19” etc. Spoof phishing attack training. We partner with a security specialist called KnowBe4 and a number of our clients have taken up this service which allows us to setup spoof phishing attacks on staff so that we can spot who is most likely to be susceptible and provide mandatory training for staff to help them to identify the threats. Ensure DMARC, DKIM and SPF are all defined for your email domain. DMARC, which stands for Domain-based Message Authentication, Reporting & Conformance, is a standard that helps email users ensure that the messages they receive are from a recognised source. Read more in our blog “Improve your email safety with DMARC”. These cybersecurity practices are essential, but they can be fairly difficult to implement and Stellarise is here to help. As one of the UK’s leading managed services providers, we provide state-of-the-art security systems and comprehensive security training for our clients. A combination of better awareness, common sense and workplace training is a good place to start, such as: SOURCES: “The cost of a cyber attack”, 2018, IT Governance https://www.itgovernance.co.uk/blog/the-cost-of-a-cyber-attack “UK Small businesses targeted with 65,000 attempted cyber attacks per day”, 2018, Hiscox https://www.hiscoxgroup.com/news/press-releases/2018/18-10-18 “SMBs could be the key to stopping UK data breaches”, 2019, TechRadar https://www.techradar.com/uk/news/smbs-could-be-the-key-to-stopping-uk-data-breaches “Five Cybersecurity trends to watch for in 2019”, 2019, Forbes https://www.forbes.com/sites/forbestechcoucil/2019/02/07/five-cybersecurity-trends-to-watch-for-in-2019/ Graphics by Fullvector, Freepik https://www.freepik.com/fullvector Based in London and Budapest, Stellarise have extensive experience addressing cyber security and risk-related issues in a variety of industries. With a comprehensive stack of smart and innovative technology, we work with our clients to develop and maintain effective and efficient cyber security solutions that support businesses across the UK. From strategy to implementation, we are ready to help you - get in touch to discuss the threats and issues affecting your business. https://stellarise.com/ 020 3137 3550 hello@stellarise.com 54 Maltings Place 169 Tower Bridge Road London SE1 3LJ Kálvin tér II. floor 8/b 1053 Budapest The cost for the UK organisations to resolve a cyber attack per type in 2017 AboutStellarise Contact Strategic partners for IT and growth