Insights: Article

Before You Open That Attachment: Creating a Policy for Avoiding Hackers

By Rich McRae

April 01, 2018

Here’s a reason to address social media through acceptable use policies in the workplace. The following was published at KnowBe4.com by Stu Sjowerman and is shared here with his permission:

Bad guys are doing research on you personally using social media and finding out where and when you (might) travel for business. Next, they craft an email especially for you with an airline reservation or receipt that looks just like the real thing, sent with a spoofed “From” email address that also looks legit.

Sometimes, they even have links in this email that go to a website that looks identical to the real airline, but is fake. They try to do two things: 1) try to steal your company username and password, and 2) try to trick you into opening the attachment which could be a PDF or DOCX. If you click on the link or open the attachment, your workstation will possibly get infected with malware that allows the bad guys to hack into your network.

Remember, if you want to check any airline reservations or flight status, open your browser and type the website name in the address bar or use a bookmark that you yourself set earlier. Do not click on links in emails to go to websites.

Have a Policy Ready
With online web-browsing and social media activities a daily norm, we recommend your policies advise employees and customers on best security practices while using social media and email. For example:

  • Personal social media accounts (Facebook, Google, Twitter) should be locked down with maximum privacy settings applied to prevent open access to personally identifiable information such as birthdates, location, activities, etc.
  • Check with the sender before opening an attachment, even if the email appears to be from another employee or trusted source.
  • Do not send confidential data, such as credit card data, customer names, email addresses, and social security numbers through non-encrypted transfer methods. For example, don’t perform online mobile banking over public Wi-Fi networks.

Contact your Eide Bailly Professional for assistance with cybersecurity and policy development guidance.

Latest Insights

March 25, 2019
Article
The IRS Section 7520 rate will decrease to 3.0% for April. Near Zero Out Grantor Retained Annuity Trusts, Sales to Intentionally Defective Grantor Trusts and Charitable Lead Annuity Trusts are attractive since interest rates are near historical…
March 25, 2019
Article
New rules designed to make it easier for the IRS to audit partnerships have also created new considerations for tax-exempt organizations entering into partnerships.
March 25, 2019
Article
Nonprofits are often a target for duplicated websites. Make sure your donors are giving to you and not an imposter.
March 25, 2019
Article
When it comes to compliance requirements, period of performance may seem simple, but there are a few pitfalls that must be avoided along the way.
March 22, 2019
Article
The advent of better technologies has created a huge opportunity for critical access hospitals to access information that can help them make informed decisions and improve efficiency.
March 21, 2019
Article
Arizona has filed a lawsuit against California over its “doing business” tax.