When Hurricane Matthew blasted through the southeast, it brought all kinds of trouble, as major storms do. As if the destroyed homes and massive flooding were not enough, natural disasters tend also to attract internet fraudsters, who seek to exploit the turmoil to line their pockets.
Individuals and companies looking to provide hurricane relief may be more vulnerable to phishing scams—especially ones that mention the disaster or ask for some sort of donation.
Phishing is an effort to induce victims to reveal sensitive information such as passwords or credit card numbers by sending them an email (or other form of online communication) that fraudulently claims to be from a trustworthy source. For example, an unlucky North Carolina resident might open up an email that seems to come from a non-profit providing food, shelter and comfort to families devastated by Hurricane Matthew, suggesting that the customer needs to enter confidential information such as a credit card number. Simply click the link below, the email prompts, and you’ll be done in no time.
Phishing messages may:
The South Carolina Governor’s office reported a fraudulent email asking residents to click on links to get updates about power outages. Recipients who took the bait were unknowingly granting hackers access to their computer and all its sensitive information.
It’s not just for hurricane season. Phishing happens all the time, and it’s getting worse. The Anti-Phishing Working Group (APWG) reported that the number of phishing websites it detected jumped a startling 250 percent between October 2015 and March 2016.
We advise our clients to be aware of and wary about the threat of phishing scams. For additional information on phishing techniques, check out Phishing.org.
It takes an average of 287 days for security teams to identify and contain a data breach, according to the “Cost of a Data Breach 2021” report released by IBM and Ponemon Institute.
More than 33 billion records will be stolen by cybercriminals by 2023, an increase of 175% from 2018.
40% of businesses will incorporate the anywhere operations model to accommodate the physical and digital experiences of both customers and employees (Techvera).
The cost of cybercrime is predicted to hit $10.5 trillion by 2025, according to the latest version of the Cisco/Cybersecurity Ventures “2022 Cybersecurity Almanac.”.
The internal team was energized. With the Level 1 work off its plate, the team turned its attention to the work that fueled company growth and gave them job satisfaction.
The three sectors with the biggest spending on cybersecurity are banking, manufacturing, and the central/federal government, accounting for 30% of overall spending (IDC).
The average cost of a data breach in the United States is $8.64 million, which is the highest in the world, while the most expensive sector for data breach costs is the healthcare industry, with an average of $7.13 million (IBM).
Forty-three percent of attacks are aimed at SMBs, but only 14% are prepared to defend themselves (Accenture).
We did a proof of concept that met every requirement that our customer might have. In fact, we saw a substantial improvement.
We did everything that we needed to do, financially speaking. We got our invoices out to customers, we deposited checks, all the things we needed to do to keep our business running, and our customers had no idea about the tragedy. It didn’t impact them at all.
“We believe our success is due to the strength of our team, the breadth of our services, our flexibility in responding to clients, and our focus on strategic support.”