Get a Quote

Spoofing

spoofing

According to Wikipedia a spoofing attack in the context of information and network security, is a situation in which a person or program successfully masquerades as another by falsifying data to gain an illegitimate advantage.

What does this mean for you and how can you protect yourself? As spoofing attacks get more and more sophisticated, email spam filtering and layered security systems act as the frontline of defense. However, these days, we’re all busy multi-tasking and answering countless texts and emails throughout the day. This makes it easier for us to let our guard down and pay less attention to each message coming in. You might receive an email from a friend, co-worker, or superior that seems a bit off, and if you’re not careful, you could become victim to a spoofing attack. Educating employees to be vigilant and pay careful attention to emails and attachments is an essential practice for the continued security of your business.

It’s important to pay close attention to emails from senders you recognize. While their name may be correct, with spoofing, sometimes a different email address may be used. You’ll naturally want to pay attention to the body of the text as well. Did they end with a different signature than usual? The language, spelling or content may seem different than what would normally be acceptable: typos, grammatical errors, and broken sentence structure may be clear indications of a spoof. If something seems off, it’s important to go with your gut. In many attacks, there is a request for money with a bank transfer or purchase to benefit the sender.

If you receive a suspicious request from your boss, co-worker or friend for a bank transfer, gift card purchase, or other request for money, be sure to question the sender via their normal email address, or call them to        qualify the request. If you are using a trusted IT company, be sure to let them know that you’ve received a spoof so they can adjust email filtering or provide additional layers of security.

At CMIT Solutions, our formula is a layered approach to security. Threats to information security change and continue to become more sophisticated. Businesses keeping financial, legal or healthcare information must be vigilant and answer compliancy standards to protect that data. At CMIT Solutions, we keep a close eye on the changing security landscape to protect our clients from threats. To learn more, contact us today!

GOT QUESTIONS?

We can help. Whatever your technology problem is, chances are, we've seen it before.