Blogs By this
author
- Embracing the Modern Workplace
- Unlock Business Agility with Outsourced IT Services
- Increasing Email Security to Avoid Business Email Compromise
- How to Protect Yourself Against Ransomware Attacks
- Cyber Security Risk Management – Threats are Evolving Much Faster Than Australian Businesses
- How to Avoid Being Scammed Online
- How to Prevent Phishing Attacks
- AWS Migration Competency – recognition of Comunet’s leadership and expertise in cloud migration services
- Myth Busting Cloud Security – How Secure is the Cloud?
- The Log4j Vulnerability: What Happened and What’s the Impact
- The Software Development Life Cycle
- What is a Business Analyst and what do they do?
- Christmas Cyber Security Tips
- Off the Shelf vs Custom Software – 7 Things to Consider
- The COVID-19 digital vaccination certificate and the value of cyber security audits
- Comunet and AWS – delivering secure, scalable and trustworthy services non-profits
Related blogs
to this blog
- What is ISO 27001 Certification?
- Protect Your Business: The Essential Eight and Beyond
- An Overview of ISO 27001:2022
- Increasing Email Security to Avoid Business Email Compromise
- How to Protect Yourself Against Ransomware Attacks
- Cyber Security Risk Management – Threats are Evolving Much Faster Than Australian Businesses
- How to Avoid Being Scammed Online
- How to Prevent Phishing Attacks
- Myth Busting Cloud Security – How Secure is the Cloud?
- The Log4j Vulnerability: What Happened and What’s the Impact
- Christmas Cyber Security Tips
- The COVID-19 digital vaccination certificate and the value of cyber security audits
- Passwords are not enough – why you need Multi Factor Authentication
- Building innovation culture
- Getting out of the swamp: Accelerated Data Lake on AWS
It’s a sad reality that we cannot trust people on the internet and as time goes on, this only becomes clearer. As potential victims become more careful, scammers have adopted more complex and convincing techniques to achieve their goals.
In the cyber security space, we talk a lot about phishing and scam emails, it would be safe to wager that if you have an email address you have received a phishing email. Most people probably have an idea in their mind of what a scam email looks like, often impersonal with poor spelling from a very questionable email address.
Proofpoint’s 2022 Social Engineering Report covers numerous false assumptions that can leave you vulnerable to attackers with real life examples of attempted attacks.
A key takeaway from the report was how much we underestimate cyber criminals, both their abilities and their boldness.
Proofpoint found almost 1,000 malicious social engineering campaigns leveraging legitimate services like Microsoft OneDrive, DropBox, or Google Drive to deliver malicious files or harvest credentials – 14% of all observed campaigns.
Few people expect a scammer to reply to an existing email chain within their own company, or to talk to them on the phone. However, in 2021 Proofpoint observed over 500 campaigns use thread hijacking, associated with 16 different malware families. In most observed cases in which email conversations are stolen off infected hosts and message replies are sent automatically by the attacker.
If you would like to speak to our Cyber Security team, please don't hesitate to get in touch.