Page 10 - PA_Enterprise_October-November-2021
P. 10
PA Enterprise
bank login credentials. Cyberattackers then fraudulent emails. Also, make sure all of your
use those credentials to transfer money out of computers and devices are running with the
victims’ bank accounts and into their account, most updated software and operating systems.
which is often overseas where funds can’t be These updates are necessary to combat the latest
recovered. bugs, including ransomware. Also, use virus
How to avoid it: Make sure staffers use the protection software that includes protection for
strategies they would use to prevent phishing ransomware, and keep it updated. Implement
attacks. This includes watching out for strong spam filters and only allow access to
inconsistencies in email addresses or domain sensitive information for those staffers who need
names or unusual language in emails. Before it.
approving a wire transfer or ACH transaction, If you get locked out of your computer, first
always call a phone number you trust, such look online to see if there are decryption tools
as your bank, and talk to someone who has available for the ransomware you’ve acquired.
been working with you. Also, instruct your Sometimes, the details of the ransomware
bookkeeping staff to reconcile transactions daily have been leaked, and good guys have already
to identify and return any unauthorized ACH developed a fix. If not, you can pay the ransom,
debits. You and your team could also consider but there’s no guarantee that you’ll get your files
blocking all ACH debits. back or that they won’t be damaged. When you
pay the ransom, you are funding a criminal’s
Unordered office supplies business model. Some experts recommend
How it works: Picture this: A person claiming to simply recreating the files you can and moving
be a vendor may call to “verify” a supply order forward.
and your address. After talking with you, they
send supplies or equipment you didn’t order and Government agency impostor scams
demand you pay for it. When you protest, they How it works: You receive a phone call from
present a recording of your conversation, which someone posing as a representative of law
includes you verifying your address, as proof that enforcement or other government agency. They
you “ordered” the supplies. threaten to impose fines, suspend your business
How to avoid it: If you receive merchandise you license, or take legal action.
didn’t order, you can legally keep it for free. But How to avoid it: Rather than getting worried that
you can prevent the appearance of ordering you’ve missed an outstanding payment, write
unwanted merchandise by directing all calls down the information the caller gives you. Then
about orders to one person or department who tell them you’ll call back. Most scammers will do
handles and tracks all orders. everything they can to keep you on the phone
and get a credit card payment. Don’t fall for it.
Ransomware Before paying any money to a supposed
How it works: A staff member clicks a link government agency, call the number for the
in a fraudulent email or opens a fraudulent agency listed in your local directory and verify
attachment, which causes your system to lock the charges. Visit in person if possible and never
up. Then the fraudster demands that you pay a send money via wire transfer or gift card.
ransom to have it unlocked to regain access to
your files. Following these tips can help you to ensure that
your business stays safe from any hackers or any
How to avoid it: Train staff members to detect malicious attacks.
PA Enterprise is published by
10 October/November 2021