Page 10 - PA_Enterprise_October-November-2021
P. 10

PA Enterprise








          bank login credentials. Cyberattackers then         fraudulent emails. Also, make sure all of your
          use those credentials to transfer money out of      computers and devices are running with the
          victims’ bank accounts and into their account,      most updated software and operating systems.
          which is often overseas where funds can’t be        These updates are necessary to combat the latest
          recovered.                                          bugs, including ransomware. Also, use virus

          How to avoid it: Make sure staffers use the         protection software that includes protection for
          strategies they would use to prevent phishing       ransomware, and keep it updated. Implement
          attacks. This includes watching out for             strong spam filters and only allow access to
          inconsistencies in email addresses or domain        sensitive information for those staffers who need
          names or unusual language in emails. Before         it.
          approving a wire transfer or ACH transaction,       If you get locked out of your computer, first
          always call a phone number you trust, such          look online to see if there are decryption tools
          as your bank, and talk to someone who has           available for the ransomware you’ve acquired.
          been working with you. Also, instruct your          Sometimes, the details of the ransomware
          bookkeeping staff to reconcile transactions daily   have been leaked, and good guys have already
          to identify and return any unauthorized ACH         developed a fix. If not, you can pay the ransom,
          debits. You and your team could also consider       but there’s no guarantee that you’ll get your files
          blocking all ACH debits.                            back or that they won’t be damaged. When you
                                                              pay the ransom, you are funding a criminal’s
          Unordered office supplies                           business model. Some experts recommend
          How it works: Picture this: A person claiming to    simply recreating the files you can and moving
          be a vendor may call to “verify” a supply order     forward.
          and your address. After talking with you, they
          send supplies or equipment you didn’t order and     Government agency impostor scams
          demand you pay for it. When you protest, they       How it works: You receive a phone call from
          present a recording of your conversation, which     someone posing as a representative of law
          includes you verifying your address, as proof that   enforcement or other government agency. They
          you “ordered” the supplies.                         threaten to impose fines, suspend your business

          How to avoid it: If you receive merchandise you     license, or take legal action.
          didn’t order, you can legally keep it for free. But   How to avoid it: Rather than getting worried that
          you can prevent the appearance of ordering          you’ve missed an outstanding payment, write
          unwanted merchandise by directing all calls         down the information the caller gives you. Then
          about orders to one person or department who        tell them you’ll call back. Most scammers will do
          handles and tracks all orders.                      everything they can to keep you on the phone
                                                              and get a credit card payment. Don’t fall for it.
          Ransomware                                          Before paying any money to a supposed
          How it works: A staff member clicks a link          government agency, call the number for the
          in a fraudulent email or opens a fraudulent         agency listed in your local directory and verify
          attachment, which causes your system to lock        the charges. Visit in person if possible and never
          up. Then the fraudster demands that you pay a       send money via wire transfer or gift card.
          ransom to have it unlocked to regain access to
          your files.                                         Following these tips can help you to ensure that
                                                              your business stays safe from any hackers or any
          How to avoid it: Train staff members to detect      malicious attacks.





                                                                                     PA Enterprise is published by
     10  October/November 2021
   5   6   7   8   9   10   11   12   13   14   15