Another day, another scam. And this is a sneaky one.
Cyber criminals are getting smarter. This recent malware threat is unusually smart. It impersonates a highly trusted brand name to get a foot in the door.
Targets receive a convincing looking email that appears to come from a widely used e-signature platform.
Attached to the email is a blank image that’s loaded with empty svg files, which are carefully encoded inside an HTML file attachment (stay with us here).
In short, it’s very clever and it’s tricking its way past a lot of security software.
That puts businesses like yours at risk. Because code within the image sends people to a malicious URL.
Open the attachment and you could unwittingly install malware onto your device – or even your network – which risks exposing your data and leaving you open to a ransomware attack.
Recently, there’s been a wave of HTML attachment attacks on small and medium sized businesses, so it’s clear that companies need to take action to stay ahead of the cybercriminals.
If you use software to sign documents electronically, double-check that emails are genuine before opening any attachments.
There’s a reason why the criminals have chosen to impersonate a trusted name.
Taking things a step further, you could block all emails with this type of attachment, to prevent employees from being exposed to scam emails in the first place. Check with your current IT provider to see what security measures you currently have in place to prevent attacks like these.
Consider a Security Awareness Training Program for your organizations team members. Making sure your workers are prepared to spot anything ‘phishy’ won’t stop everything from getting through, but it’s a good first step.
If you’d like any further advice, or help implementing extra security measures, get in touch.
Published with permission from Your Tech Updates.
Our 5 Reasons Why You Should Move Your Business to the Cloud
Have you ever heard of cloud computing? You may have been told to move to the cloud and are now wondering why you should do…
How COVID-19 Confirmed the Importance of a Business Continuity Plan
Business owners didn’t see the global health pandemic coming, just like most of the rest of the population. People were sceptical in the early days…
What Should Be Included In A Cyber Incident Response Plan
Protecting your business against cyberattacks involves ensuring that you have in place the different security layers including protecting the network, patching applications, protecting the endpoints,…
Tech Strategies to Extend Innovation & Growth
It is no secret that improved technology can drive growth and innovation within a company. There are many, many options that can support and lead to that growth. In this blog we will zero in on a couple that any business can use to take their company to the next level.
Are you using Teams to share sensitive data?
Microsoft Teams has fast become one of the most useful business tools for the way we work today. No matter where your people work from,…