Cybercriminals often focus on the human factor and try to manipulate employees so that they hand over money, secret data or sensitive information. Our cooperation partner Watchlist Internet will show you how to protect yourself and your company from common scams.
At the beginning of the scam is the message
It usually starts with some kind of message. Often it is an email, sometimes a text message or even a phone call - with which criminals try to harm a company. But technical security gaps or data leaks can also be a reason for a successful cyber attack.
Basic rule: check messages
To protect your company, employees need to know how to recognize internet fraud and cyber attacks. The following basic rules must be observed.
Check sender
Before clicking links, opening file attachments or revealing secret information, messages should be checked. The following questions can help:
Unfortunately, if the sender address or phone number is correct, this does not always mean that the message is trustworthy.
Question the meaningfulness
Fraudulent messages are usually accompanied by a request (data information, money demand, opening an attachment, etc.). Here it is important to pause for a moment and consider whether the request even makes sense:
We explain in detail how you can recognize fraudulent messages in the article How to protect yourself from phishing attempts.
Adhere to password security rules
If criminals know passwords, they can get secret information as well as money - identity abuse is also possible by cracking a password. This affects private individuals as well as companies. The workforce should therefore pay attention to password security in both their private and professional environments:
We have summarized even more tips on password security .
Don't forget technical protection
To ensure that harmful programs cannot be installed in the first place and that security gaps in the operating system or installed programs do not provide an entry point for cyber criminals, the technical level must be taken into account:
Define and communicate safety-critical company processes
Many attacks are based on so-called “social engineering”. Before an attack, criminals collect information about a company, the company's processes and systems and about its employees. This is how the criminals try to manipulate. However, if there are clear internal guidelines, it becomes more difficult for criminals.
Conversely, the attackers benefit if the workforce does not know company processes: For example, if someone does not know how payments are approved and carried out in the company, it can more easily happen that money ends up in the hands of criminals.
Therefore, safety-critical processes must be clearly defined and communicated. Know about scams
Corporate fraud scams
In order not to be at the mercy of cyber criminals, it is also important to know their tricks. These are common scams that mainly affect companies:
Source: How to protect yourself and your company from fraud!
Do not miss! The dried-up Elbe in Dresden: No evidence of a “climate hoax”
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )