How To Address Business Email Compromise or “CEO Fraud” in Your Business

Entrepreneur

Fraudsters are constantly inventing new scams to outsmart the general public online.  The cleverest of this deceitful pack are always trying to one-up their competition by developing the wiliest and therefore most successful variations on online fraud. Business Email Compromise, or “CEO Fraud” is the latest popular scam.  It involves targeting businesses by impersonating the CEO or other key executives to fool employees into performing unauthorized tasks. If you receive an urgent email from your boss, you want to take action right away, correct?

Fraudsters can easily browse your company website and search through social media profiles to identify your key executives and other supporting staff such as finance, office administration, etc.. Most people reveal way too much information about their roles and responsibilities, their out of office detail and more. Thieves can, fairly effortlessly, harvest most of the information needed to put together a very targeted, very genuine appearing campaign for this purpose.

This can be a simple email appearing to come from the CEO asking for a reply with personal or confidential information,  asking to purchase gift cards, or in more sophisticated cases asking to execute a wire transfer or other highly sensitive financial tasks. This is a very easy type of fraud because it plays on an already established level of trust. Employees want to help. Most employees will drop what they are doing and prioritize a task like this from the CEO without question.  Identifying what is genuine and what is fraudulent is sometimes difficult.

Most of the time, the scam is identified after it is too late. According to the FBI – CEO Fraud has cost businesses in excess of $12.5 billion dollars and it’s growing.  It happens worldwide and is not specific to any country.

I’m often asked what are the top things businesses should spend their money on to prevent fraud and these types of scams. My answer is always the same. You can spend all the money you want on antivirus, intrusion detection, next-generation filters and other technologies, but all this technology will be nearly useless if you don’t focus on educating your staff first. If your staff is not aware of these scams and how to identify them, you’re vulnerable. I relate it to purchasing fancy locks for your house. If everyone in your house is not aware that you’re not supposed to open the door for strangers, the locks are useless.

Start with employee education and awareness. Employees are the weakest link in any cybersecurity program, but they can also be the greatest asset by serving as the first line of defense. Identify your most at-risk users and empower them with the knowledge and awareness to identify these scams early on.

In parallel, invest in technical controls, a security policy and procedures to formalize the process. Employee awareness cannot be a “Set it and forget it” type approach. Continuous reinforcement and testing are key. As threats and scams evolve, employees need to be made aware of how this impacts their roles. How do users stay on top of what to click on and what isn’t? To which requests it’s ok to respond?  Also, give them real examples of disasters and lost personal money that have resulted when employees elsewhere did not listen to warnings.  Who wants to lose $500, $1000 or more, and especially to willful, deceitful grifters, out for nothing but personal enrichment?

If your business does fall victim to one of these scams – stop and assess the situation. What information was put at risk? In recent cases, staff have shared employee W2 information and other company sensitive data. If your organization fell victim to an unauthorized wire being sent – contact your bank and law enforcement immediately. Preserve all evidence. This can be very embarrassing for the person who was the victim but encourage them to share all the details they are aware of and preserve all of the evidence:  Emails, wire confirmations etc. This will be needed for forensics and to try to track the fraudster. This will also help identify any gaps in your security program which can be used to strengthen your safety in the future.

The more that is reported and called attention to, the greater the chances that any future efforts to defraud employees will be discouraged.



Add Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Pony Ma
10 Things You Didn’t Know about Pony Ma
Tommy Hilfiger
The History of and Story Behind the Tommy Hilfiger Logo
Red Bull
The History of and Story Behind the Red Bull Logo
Mike Grillo
10 Things You Didn’t Know About Mike Grillo
ETF
Five Blue Chip ETF Recommendations You Can’t Go Wrong With
ETF
Which Private Equity ETF Should You Invest In?
Copper
Five Copper ETFs You Should Consider
Gasoline
Which Gasoline ETFs Should You Invest In?
Fish Tale Brewpub
The 10 Best Places to Eat in Olympia, WA
Hiking in Ecuador
The Traveler’s Guide to Hiking in Ecuador
Galapagos Islands
The 20 Best Things to do in Ecuador For First Timers
Lo Nuestro
The 10 Best Places to Eat in Ecuador
Why 1957 Was a Significant Year for Cadillac
Cadillac Brougham
Whatever Happened to the Cadillac Brougham?
Seville Convertible
The 10 Best Cadillac Seville Models of All-Time
Cadillac Catera
Whatever Happened to the Cadillac Catera?
Omega Watch
Tag Heuer vs. Omega: Who is the Better Watch Brand?
TAG Heuer
The Buyer’s Guide to Getting a Vintage Tag Heuer Watch
TAG Heuer
The Top Five Tag Heuer Gold Watches of All-Time
TAG Heuer
The Five Best Tag Heuer 2000 Watches of All-Time
Courtney Love
How Courtney Love Achieved a Net Worth of $100 Million
Jon Taffer
How Jon Taffer Achieved a Net Worth of $14 Million
Anuel AA
How Anuel AA Achieved a Net Worth of $6 Million
Tim Ferriss
How Tim Ferris Achieved a Net Worth of $100 Million