Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Protect Yourself from Invoice Impersonation

Tip of the Week: How to Protect Yourself from Invoice Impersonation

As cybercriminals become increasingly sophisticated in their methods of attack, it is important that your staff--the ones on the front lines--are educated to spot these attempts and know what to do if one is encountered. In order to spot these attacks, it is important to know what to look for.

Unfortunately, the increased sophistication of these attacks have made them harder to spot and resultantly, harder to avoid. This has led to a rise in the use of an attack vector known as an invoice impersonation attack. When utilizing these attacks, a cybercriminal will send a message under an assumed name (often one that belongs to a regular contact in actuality) that includes an invoice number and a link, presumably to download the invoice.

However, rather than downloading the invoice, as expected, the target of an attack will discover that they have actually downloaded some malware. This is often how ransomware is introduced into a system.

Warning Signs
To avoid falling victim to an invoice impersonation attack--or any form of email phishing or fraud--your users should know to keep their eyes out for any warning signs.

Messages containing a payment request and link
One of the bigger security issues with the concept of email is the fact that most users can only take it on good faith that the message comes from the person it appears to have. There is no voice to identify as someone else’s, and no handwriting to compare to the actual person’s.

Therefore, if an email comes from someone with a request for payments to be made, with a link to what is claimed to be a payment portal, don’t click. You might have just dodged a ransomware program delivered via a phishing attempt.

How to Protect Your Business (with the Help of Your Employees)
Phishing attacks, including invoice impersonation attacks, rely on their target to trust the content enough to not question if the sender is who they say they are. As such, they can be avoided with a little mindfulness on the part of your employees.

Make sure your employees know to keep an eye out for risk factors. Requiring regular training sessions as well as testing their cybersecurity mindfulness will help to keep awareness alive and well among your staff members.

Furthermore, you should have updated spam filters and malware blockers installed to help minimize the risk that these messages even make it to your staff in the first place. This is where Network Synergy can help.

If you’re interested in the solutions we have that can help make cyberthreats a non-issue, give us a call at 203.261.2201.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 22 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Online Currency Firefox Printing Productivity Excel Drones Writing Star Wars Technology Downloads Politics Windows 8.1 Update Business Technology Statistics Files Document Management Data Management LiFi WiFi Domains Taxes Error Relocation VPN IT Services Computing Small Business Time Management Training Data Recovery Tutorials Virus Chromebook PowerPoint Hard Drive Paperless Office Risk Management Windows User Mobile Technology Digital HIPAA IP Address Monitors Telephony Webinar Google Analytics Screen Reader Internet of Things Digital Payment Recovery Analyitcs Storage Migration PC Care Tip of the week Presentation Bandwidth Technology Laws Staffing Virtual Desktop Emoji Backup Cyber Monday IT budget Phone System Identity Multi-Factor Security Charger Money Connectivity Router Project Management Unified Communications Permissions Automation BYOD Cybercrime Personal Information VoIP IT Support Settings Environment Healthcare Security Operating System Fax Server Gmail Start Menu Point of Sale Managed IT Nanotechnology Office Cryptocurrency Search Microsoft Excel Food Network Security Alert Big Data Robot Hacks Internet Mobile Device Antivirus Lithium-ion Battery Saving Time 5G Twitter USB Managed IT Services Vendor Management Leadership Windows 10 Trainging Public Cloud Tip of the Week Hosted Solutions Debate Access Control Humor Thank You The Internet of Things Ransomware Smartphones Trending Network Congestion Automobile Hacking Server Management Scary Stories Memory Microsoft Botnet Customer Relationship Management Email Social Content Filtering Proactive IT People Mail Merge IT service Deep Learning Firewall PDF Remote Computing Data Breach Sports Telephone Systems Infrastructure Best Practices Computers Network Management CrashOverride Networking Cloud Google Drive Data Warehousing Word Privacy Battery Supercomputer Unified Threat Management Solid State Drive Browser Regulations Black Market Work/Life Balance Alt Codes Fraud Intranet Data Loss G Suite Holiday Passwords Identity Theft Chatbots Server Mirgation Efficiency Programming Redundancy Malware Consumers Cost Management Unsupported Software Cabling IT Management Save Money Web Server Google Wallet Windows 10 Customer Service End of Support File Sharing Bluetooth Application Cloud Computing Artificial Intelligence Fun Gadget Managed Service Provider Business Owner Video Surveillance Samsung Smart Technology Print Server Typing Notifications Cameras Social Media Government Google Docs Business Intelligence IT Technicians Virtualization Applications Retail Wi-Fi Cooperation Recycling eWaste Safety Dark Web Distributed Denial of Service Apps Break Fix Electronic Medical Records Unified Threat Management Health Websites Computer Care Disaster Resistance App LinkedIn Private Cloud Social Networking Laptop Shortcut Tip of the Work Modem Upgrade Conferencing Software Tips Remote Monitoring communications Spam Education Sync Cache Utility Computing Cleaning Co-managed IT Technology Tips Information Technology IT Consulting Congratulations Computer Repair IoT Remote Support Android Specifications Travel Meetings Office Tips Business Computing Hard Drives Mobile Security Comparison Logs Computer Accessories Work Station Public Speaking Undo Touchscreen Entrepreneur Computer Printer Webcam Wireless Technology Secruity Help Desk Hackers Backups Competition Net Neutrality CCTV Virtual Private Network Legislation Gadgets Windows 8 Gaming Console Encryption Cortana Identities iPhone Productivity Vulnerability Phishing Troubleshooting Law Firm IT Hosted Solution Marketing History Mobile Device Management Lenovo Servers Legal Users Managed IT services Best Practice Disaster Streaming Media How To Blockchain User Tips Miscellaneous Business Continuity Office 365 Text Messaging Hiring/Firing Virtual Reality Augmented Reality Alerts Managed IT Service User Error Bring Your Own Device Hardware Motion sickness 3D Staff Assessment Apple Disaster Recovery IBM IT Consultant IT Support Downtime Running Cable Chrome Tech Support Consultation Hacker Documents Mobile Computing Facebook Experience Password Tech Term Patch Management IT Solutions Administrator Digital Signature GPS Data Security Language SharePoint Collaboration Business Growth Company Culture Flexibility Licensing Google Calendar Crowdsourcing Workplace Tips Techology Black Friday Uninterrupted Power Supply Maintenance Wearable Technology Macro Physical Security Display Going Green Motherboard Crowdfunding Halloween Network Skype SaaS Quick Tips Avoiding Downtime Inbound Marketing Spyware Innovation Employer-Employee Relationship Administration eBay Mobility Hard Disk Drive Buisness Best Available Wireless Mobile Devices Outsourced IT Website Hotspot Microsoft Office Save Time Machine Learning BDR Software as a Service Refrigeration Address Budget Computing Infrastructure Cookies Tablet Superfish 3D Printing Social Engineering Current Events Smartphone Cybersecurity Upgrades Two-factor Authentication Heating/Cooling Mouse CIO Processors Scam Corporate Profile Internet Exlporer Business Outlook Saving Money Operations Google Mobile Office Service-based Business Mobile Data Data Backup Piracy Communication Business Management Smart Tech Scheduling Software YouTube Google Maps Bitcoin Knowledge Law Enforcement Tracking Value Data Data storage Compliance

      Latest Blogs

      Artificial intelligence is perhaps most commonly known as a malevolent force, thanks to popular culture. HAL 9000, Ultron, and many others have reinforced that A.I. will be the dow...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube