email hijack
No matter what your turnover is, that scenario would be a total nightmare, wouldn’t it? But perhaps you’re confident that it could never happen to your business. Well, let me gently challenge that. Because I’ve seen this kind of theft happen to plenty of businesses.
It’s not a company insider who steals the cash. Nor someone at the bank. And it doesn’t require anyone to steal your bank login credentials.
No, this kind of theft can be set up very easily by a hacker – and all they need is to gain access to one person’s email account.
In fact, email is the number one security threat to your business. It’s where most cyber breaches start.
Because if you think about it, your email is the “in and out” of most business communications. Far too often we are contacted by businesses whose staff think they have “clicked on a dodgy link”. Even the best defences are constantly tested by the huge attacks on your IT system that can be unleashed.
The days of hackers breaking into email just for fun, or to cause havoc are long gone. These days, they are more likely to access an account and set up a hidden email forwarder. That means they can monitor all emails being sent to you.
And from there they can spot patterns. Such as a large invoice sent by a key supplier, on the same date each month.
Then all they need to do is implement some clever social engineering… such as sending a fake follow-up email with “new bank details” immediately after the real invoice has been received…
This exact scenario is the subject of my new book on email security. And I want to give you a free copy.
It’s written from the point of view of a fictitious business owner called Mark. Whose business is targeted in exactly that way.
And he’s horrified to discover how easily he was hacked.
The book is an essential read for every business owner and manager. It explains complicated cyber security concepts in a way that anyone can understand.
It also reveals that these days, every business can be hacked. Because hackers don’t go after specific targets any more. They use automated software to target ALL businesses, ALL the time.
The book also shows you how best to defend yourself and your team. There are a huge number of protective measures you could use.
But the real trick is finding the right blend that suits your business. One that protects you well, without interrupting how your staff do things (creating frustration among your staff).
I’m giving away free copies of Email Hijack for two reasons. First to educate business owners and managers about how email is the gateway to most cybercrime.
But also, to act as an introduction to us and our services. We look after hundreds of businesses in the North West and keep them safe from hackers.
Fill in your details and we’ll instantly send you a PDF, and then pop a physical copy in the post to you.
David Lloyd
IT & Cyber Security Specialist
Or, give us a call on 01204 221101
We provide a flexible, straightforward service that evolves with your business. No selling. No long-term contracts. Just the right help at the right time.
Bluebox Integration is a trading style of the business alliance between:
Black Sheep Business Communications Ltd – Company Registered in England & Wales No: 5814504 VAT No: 884 0769 83
Bluebox Communications Ltd – Company Registered in England & Wales No: 4737035 VAT No: 815 9409 14