Blogs By this
author
- Embracing the Modern Workplace
- Unlock Business Agility with Outsourced IT Services
- Social Engineering Attacks: Proofpoint’s 2022 Social Engineering Report
- How to Protect Yourself Against Ransomware Attacks
- Cyber Security Risk Management – Threats are Evolving Much Faster Than Australian Businesses
- How to Avoid Being Scammed Online
- How to Prevent Phishing Attacks
- AWS Migration Competency – recognition of Comunet’s leadership and expertise in cloud migration services
- Myth Busting Cloud Security – How Secure is the Cloud?
- The Log4j Vulnerability: What Happened and What’s the Impact
- The Software Development Life Cycle
- What is a Business Analyst and what do they do?
- Christmas Cyber Security Tips
- Off the Shelf vs Custom Software – 7 Things to Consider
- The COVID-19 digital vaccination certificate and the value of cyber security audits
- Comunet and AWS – delivering secure, scalable and trustworthy services non-profits
Related blogs
to this blog
- What is ISO 27001 Certification?
- Protect Your Business: The Essential Eight and Beyond
- An Overview of ISO 27001:2022
- Social Engineering Attacks: Proofpoint’s 2022 Social Engineering Report
- How to Protect Yourself Against Ransomware Attacks
- Cyber Security Risk Management – Threats are Evolving Much Faster Than Australian Businesses
- How to Avoid Being Scammed Online
- How to Prevent Phishing Attacks
- Myth Busting Cloud Security – How Secure is the Cloud?
- The Log4j Vulnerability: What Happened and What’s the Impact
- Christmas Cyber Security Tips
- The COVID-19 digital vaccination certificate and the value of cyber security audits
- Passwords are not enough – why you need Multi Factor Authentication
- Building innovation culture
- Getting out of the swamp: Accelerated Data Lake on AWS
The Australian Cyber Security Centre (ACSC) has released advice warning citizens to strengthen their email account security to protect against Business Email Compromise. This is where an attacker will imitate business emails or compromise legitimate business email accounts to provide malicious information to clients.
Some examples of Business Email Compromise:
- Account compromise: a legitimate business email account is compromised and the attacker uses this trusted account to send malicious emails.
- False invoice: attackers send convincing but falsified invoices featuring fraudulent bank details that actually belong to the attacker.
- CEO/Executive fraud: an attacker will present themselves as your company’s CEO or other Executive and request funds be transferred or invoices be paid to a fraudulent account.
Furthermore, the ACSC has provided simple guides on how to secure Google and Microsoft based email accounts.
If you are currently using an email service that cannot be strengthened using the methods suggested by the ACSC, we would strongly recommend you consider migrating to a secure alternative.
If you or your business have any questions or comments about email security, please feel free to reach out to us.