Page 9 - PA_Enterprise_October-November-2021
P. 9

PA Enterprise









          Phishing                                            Fake invoices
          How it works: Imagine that an employee who          How it works: Your accounts payable employee
          handles purchasing for your business receives an    receives an invoice for a load of boxes and
          email that appears to be from your company’s        other shipping supplies. She knows that your
          vice president. The email requests that the         warehouse regularly orders shipping supplies. So
          employee order a new laptop and have it             even though she doesn’t recognize the vendor,
          shipped to an unfamiliar address. Because the       she assumes the invoice is legitimate and pays it.
          email appears to come from an executive team        However, the invoice was from a scammer who
          member, the employee follows the request            has never sold anything to your business, and
          and inadvertently purchases and ships a new         they just made several hundred dollars off your
          computer to a thief.                                business.

          Phishing emails are targeted emails that appear     When scammers send fake invoices charging you
          to come from official accounts, clients, and        for services or items you never received, they
          stakeholders. They are intended to trick recipients   take a bet that whoever pays won’t check the bill
          into sending money, expensive items, or             before paying. They may also make an invoice
          personally identifiable information. That sensitive   for the types of materials or supplies you would
          information may include Social Security numbers,    usually purchase, so it doesn’t look suspicious.
          birth dates, gym membership information, and        How to avoid it: Make sure to review each invoice
          other data that makes it easy to commit identity    for legitimacy, and never pay unless the charges
          theft. In many cases, these emails appear to        are verified. Train your staffers to do the same
          come from higher management requesting              thing. Even if the invoice appears to come from
          that HR personnel send personal information         a trusted vendor if it has a different address than
          (think W-2’s). This provides thieves with enough    the one you usually remit to, call the vendor to
          information to steal employees’ identities and      verify. Find the vendor’s number on previously
          damage their finances.                              approved invoices or online to ensure that you
          How to avoid it: Train employees to recognize       are not being redirected to the scammer’s phone
          fraudulent emails. In many cases, phishing emails   number.
          will contain grammar mistakes and spelling          Also, make sure your business has clear
          errors, or logos and other graphics that look a     procedures for processing and paying all
          little off. Also, instruct employees to check with   invoices. For instance, the person who ordered
          the supposed sender before providing sensitive      the supplies or services should be required to
          information or valuable property. All employees     verify the invoice before the accounts payable
          should be instructed to verify any request via      department can pay it.
          trusted communications channels, such as a
          phone call or originating a new email to the        ACH and wire transfer fraud
          person’s company email address, or looping in       How it works: ACH transactions and wire
          someone from legal to review the request.
                                                              transfers are the quickest ways to send
          Frequently, phishing emails will come from          cash, and scammers are taking advantage
          an email address that looks very similar to         of these transactions to steal from bank
          the legitimate email address, with one or two       accounts. Cybercriminals use phishing emails,
          different letters. Instruct employees to review     compromised websites, and malware to steal
          the email address when they receive sensitive
          requests carefully.                                                                      Continued u




         PA Enterprise is published by
                                                                                   October/November 2021   9
   4   5   6   7   8   9   10   11   12   13   14