<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Wire Transfer Fraud Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/wire-transfer-fraud/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/wire-transfer-fraud/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Sun, 17 Aug 2025 17:16:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Wire Transfer Fraud Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/wire-transfer-fraud/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Wire Transfer Fraud Just Got Smarter &#8211; Your Defenses Need to Catch Up</title>
		<link>https://fosterinstitute.com/wire-transfer-fraud-just-got-smarter-your-defenses-need-to-catch-up/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sat, 16 Aug 2025 05:46:22 +0000</pubDate>
				<category><![CDATA[ACH Fraud]]></category>
		<category><![CDATA[BEC]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Wire Transfer Fraud]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=6104</guid>

					<description><![CDATA[<p>&#160; EXECUTIVE SUMMARY New Business Email Compromise (BEC) attacks targeting wire transfers cost organizations billions annually. Threat actors have developed new techniques to bypass even sophisticated email protection filters in organizations like yours and can use new AI deepfakes as a new way to bypass voiceprint protection at the banks. This article reveals these new [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/wire-transfer-fraud-just-got-smarter-your-defenses-need-to-catch-up/">Wire Transfer Fraud Just Got Smarter &#8211; Your Defenses Need to Catch Up</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<h2 style="margin-bottom: 15px;">EXECUTIVE SUMMARY</h2>
<p><strong>New</strong> Business Email Compromise (BEC) attacks targeting wire transfers cost organizations billions annually. Threat actors have developed <strong>new techniques to bypass even sophisticated email protection filters</strong> in organizations like yours and can <strong>use new AI deepfakes as a new way to bypass voiceprint protection at the banks</strong>.</p>
<p>This article reveals these new threats. So that you can have more wire transfer security in one document, this article covers several key components to have in your organization’s wire transfer process to help protect against <strong>new</strong> and old threats. It also includes some<strong> new protective changes your IT Team can implement </strong>in your computer systems and processes, including ways to protect against both existing and new threats.</p>
<p style="margin-bottom: 15px;">The losses can be devastating &#8211; one organization lost hundreds of thousands and a top executive. Review your wire transfer policy today, and conduct a tabletop exercise this quarter. Your organization’s financial survival may depend on it.</p>
<h2 style="margin-bottom: 15px;">It is Time to Update Your Wire Transfer Process Policy and Procedure Documentation</h2>
<p style="margin-bottom: 15px;">Fraudulent wire transfers, part of an attack referred to as Business Email Compromise (BEC), are very frequent and expensive for organizations that fall prey to these attacks. The FBI IC3 reports that BEC costs organizations billions of dollars each year. I want to help you avoid being a victim.</p>
<p style="margin-bottom: 15px;">Something new that&#8217;s related to wire transfer fraud: The threat actors have a <strong>new technique that successfully bypasses spam filters.</strong> We&#8217;re receiving concerned email questions, as we should be, like this one from a very savvy IT Pro who wrote in frustration: &#8220;The email bypasses one of our main filters for external mail.” The “main filter” he is referring to is a very expensive email protection service that is very effective at preventing external phishing. At least it was, until now. Attackers found a way through not just his, but any systems not protected by the new technical fix we gave him right away, which is included below. <strong>Your protection may be vulnerable too</strong>. The need for you to know what to fix is the primary reason I penned this article.</p>
<p style="margin-bottom: 15px;"><strong>In another new development,</strong> Sam Altman, CEO of OpenAI, which makes ChatGPT, is warning the Federal Reserve: Fraudsters can use improved AI-generated voice to completely defeat voice-print authentication. He says that threat actors will be able to call a bank, pass the voice recognition test for access to their victim’s accounts, and move money wherever they want.</p>
<p style="margin-bottom: 15px;">One of our customers got compromised. When one of their vendors called asking about hundreds of thousands in unpaid bills, the company realized they&#8217;d been paying a fraudster for a year.</p>
<p style="margin-bottom: 15px;">Our customer had a strict protocol: The vendor must fill and sign a specific form, then, following separation of duties, one person approves the change and another updates the routing and account numbers. Unfortunately, fraudsters breached the victim company&#8217;s email and easily identified the process by tracking a legitimate request.</p>
<p style="margin-bottom: 15px;">The hackers breached the email system of one of the victim&#8217;s largest suppliers. They immediately sent an email from that company to the person who approves transfers and another directly to the person who changes the routing and account number using a forged approval signature.</p>
<p style="margin-bottom: 15px;">It was almost impossible to catch that, and they only found out after a year when the large vendor contacted them, saying they&#8217;d had a glitch that resulted in no statements being sent, and asked about the hundreds of thousands of dollars the victim company owed the vendor. And, of course, the victim company had been paying all along, but the money was going to a happy fraudster who enjoyed a significant income for their efforts. The loss was devastating. A top executive, one of the smartest and kindest people I&#8217;ve ever known, left the company soon after.</p>
<p style="margin-bottom: 15px;">Threat actors successfully bypass spam protection by tricking anti-phishing systems into believing their message, sent from an external server, came from inside your network. The duped spam filter doesn&#8217;t check the message and allows it through because, by default, all internal email messages are allowed. This trickery removes the need for the threat actors to breach the victim company&#8217;s email system.</p>
<p style="margin-bottom: 15px;">You&#8217;ve seen the online videos of deepfakes and how difficult it is to tell some of them apart from a real human. Although it isn&#8217;t common yet, threat actors could theoretically use AI to use deepfake voices that sound very convincing during an approval process. OpenAI is specifically warning banks about this risk right now. Threat actors are using deepfake video in job interviews now, so it is reasonable to expect that they will use audio impersonation to fake a vendor representative&#8217;s voice to successfully and fraudulently complete the approval process.</p>
<p style="margin-bottom: 15px;">Have a Wire Transfer Process Policy that your team adheres to. Be sure there is extensive training and regular samples. If your team knows there could be a test message at any time, they&#8217;re more likely to stay vigilant.</p>
<p style="margin-bottom: 20px;">I know you can use AI to write one, but here is a sample wire transfer policy we&#8217;ve spent a lot of time compiling that you can adjust to fit your organization:</p>
<ol style="margin-bottom: 20px;">
<li style="margin-bottom: 15px;"><strong>Receive and log the request</strong> into whatever logging system you&#8217;re using now. Even a spreadsheet would work. Record:
<ol style="list-style-type: lower-alpha; margin-top: 10px;">
<li style="margin-bottom: 10px;">Entity requesting the transfer</li>
<li style="margin-bottom: 10px;">How they contacted you: email, phone, etc.</li>
</ol>
</li>
<li style="margin-bottom: 15px;"><strong>Look for Obvious Problems:</strong>
<ol style="list-style-type: lower-alpha; margin-top: 10px;">
<li style="margin-bottom: 10px;">Carefully check the email address to confirm the text after the @ sign matches the company&#8217;s domain. If they don&#8217;t, check your email history to see what domain name they typically use. And of course, you already know the source and reply-to email addresses can be spoofed anyway. If anything is off in the addresses, consider the message fraudulent.</li>
<li style="margin-bottom: 10px;">Does the request indicate some urgency? If so, be very suspicious that it is fraudulent.</li>
<li style="margin-bottom: 10px;">Does it ask you to keep something secret, such as a surprise or gift? If so, be very suspicious of this, too.</li>
<li style="margin-bottom: 10px;">Do you already have different payment details on file for that company? If so, be extra careful.</li>
<li style="margin-bottom: 10px;">If something feels &#8220;off&#8221; about the request, trust your gut feeling and escalate it for secondary review. Sometimes our brains can detect subtle clues that aren&#8217;t obvious, and fraud is so expensive that you must honor all indications, even when it is just an odd feeling about the message. It is better to err on the side of safety than lose a fortune to fraud.</li>
<li style="margin-bottom: 10px;">If someone phones you, keep in mind that AI is excellent at helping threat actors create deep-fake audio impersonations. If you&#8217;re unsure, start a casual conversation and ask specific questions about their city. If they can&#8217;t answer even simple ones, or they make an excuse like having just moved there, that is a big red flag. If a threat actor is using a voice chatbot responding to you directly, it will know the answers to your questions right away, but at least it gives you more time to see if the voice sounds AI-ish.</li>
<li style="margin-bottom: 10px;">Just because you confirm that an email is from a company, that doesn&#8217;t mean it is valid. Threat actors earn lots of money if they succeed, so they are motivated to invest a lot of time and use sophisticated techniques to hack into the email of one of the companies you already transfer money to. Then they can send and receive email via the company&#8217;s actual mail servers. The company whose email they hacked has no idea.</li>
<li style="margin-bottom: 10px;">Tell other members of your team about messages that concern you so they can spot them quickly.</li>
</ol>
</li>
<li style="margin-bottom: 15px;"><strong>Mandatory Callback Verification</strong> if the message passed the initial review
<ol style="list-style-type: lower-alpha; margin-top: 10px;">
<li style="margin-bottom: 10px;">Verifications must be conducted out-of-band, meaning in a different way than the request arrived. For example, if the request arrived by email, verify it in a different way</li>
<li style="margin-bottom: 10px;">If your organization utilizes secure communication methods, such as encrypted email or a secure portal, contact the person that way to confirm the transfer or account number update.</li>
<li style="margin-bottom: 10px;">If you need to use email, forward, not reply, the request to the supposed person at the company domain (not another domain; watch for minor typos in the domain name) and ask if they sent that message.</li>
<li style="margin-bottom: 10px;">Call the person requesting the transfer or account number update. Avoid calling the phone number provided in the email message. Find the phone number you typically use or look up the phone number at the company&#8217;s website or another independent way.</li>
<li style="margin-bottom: 10px;">Ask the person to call you back so you can verify that the phone number matches the one on the company&#8217;s website. If the number doesn&#8217;t match exactly, the area code, prefix, and first one or two numbers should.</li>
<li style="margin-bottom: 10px;">If this is a new setup, or a change in account number, contact a second person at the organization to independently confirm the worker&#8217;s identity whom you contacted.</li>
<li style="margin-bottom: 10px;">Document all of this in your log.</li>
</ol>
</li>
<li style="margin-bottom: 15px;"><strong>Dual Approval for transferring money</strong>
<ol style="list-style-type: lower-alpha; margin-top: 10px;">
<li style="margin-bottom: 10px;">See if your bank will allow you to set up dual approval so that two people must confirm each wire transfer. If your business processes dozens of wire transfers every day, consider setting a threshold where you only need two people if the transfer is over a specific amount.</li>
<li style="margin-bottom: 10px;">Even if your bank doesn&#8217;t have the two-person verification option, you can still use that process internally on your own by having the person who is about to make the transfer get the sign-off of another worker who can verify it.</li>
</ol>
</li>
<li style="margin-bottom: 15px;"><strong>After you make the transfer</strong> or update the routing and account numbers, send a confirmation to the user at the company using the email address you independently verified. Do not assume the email address or the &#8220;reply to&#8221; address is accurate. Update the log entry that corresponds with the transaction you started when the request arrived, so you&#8217;ll be able to review the details if you need to.</li>
<li style="margin-bottom: 15px;"><strong>Immediately activate the response plan</strong> described below if you suspect fraud has happened. Speed is of the essence because the sooner your bank and the authorities know about the fraud, the more likely it is that they can recover some or all of the money. There are no guarantees, but act quickly anyway.</li>
</ol>
<p style="margin-bottom: 20px;">Here is a list of other essential steps we created for you. Some are more technical, but you can always lean on your IT team to help:</p>
<ol style="margin-bottom: 20px;">
<li style="margin-bottom: 15px;">By default, most spam filters allow all internal messages between your workers to pass through without inspection. As mentioned above, attackers can successfully trick your email systems into believing the sender is inside the company. They can trick your anti-fraud tools to pass their wire transfer requests without scrutiny. Ask your IT Department to change the settings to remove this bypass and <strong>require all messages, internal and external, to be tested thoroughly.</strong></li>
<li style="margin-bottom: 15px;"><strong>Thoroughly educate your team</strong> about preventing BEC and wire fraud.</li>
<li style="margin-bottom: 15px;"><strong>Check your regulatory and legal requirements</strong> for your industry and your situation. There is a chance that there are specific wire transfer regulations that will apply to your organization.</li>
<li style="margin-bottom: 15px;"><strong>Ask your bank and your application providers what forms of fraud protection services they offer.</strong> AI is empowering banks and other financial institutions to watch for suspicious behaviors. The tools can watch trends with all of the transactions they process and also watch for irregularities from your organization&#8217;s typical usage. AI is getting better and better at catching fraud quickly. Make sure yours is set at the highest level.</li>
<li style="margin-bottom: 15px;">You can <strong>utilize the security principle of &#8220;separation of duties&#8221;</strong> by ensuring that the person approving the transfer is different from the one making the transfer. This is the &#8220;separation of duties&#8221; principle that can help catch fraud since more than one person has a chance to recognize an issue.</li>
<li style="margin-bottom: 15px;"><strong>An attacker might use deepfakes</strong> to dupe you into thinking everything is legitimate. After all, if they stand to make a mint, they will go to great lengths, the stuff Hollywood is made of. Someday, it might get to the point that some transactions must happen in person. If going in person is not practical, an alternative that would be very difficult, as of today, for an attacker to simulate would be a video call with multiple people whom you recognize from the other organization in the same online meeting at the same time, especially if the vendor&#8217;s representatives are in a setting you recognize. The threat actor would have to accurately depict the background, animate all the people at the company and give them the right voices and the right things to say in a very human way. The technology just isn&#8217;t that good yet.</li>
<li style="margin-bottom: 15px;">Ensure your IT Department has configured <strong>alerts that will trigger the moment a new email rule is created.</strong> It is very common for threat actors to breach a company, configure email forwarding rules, and then get out before they&#8217;re noticed, all to prepare for lucrative fraudulent email requests. In post-incident forensics processes, we frequently discover that the threat actor was only in the network for a few minutes and was gone before even the best EDR, XDR, and other automated detection tools could notice. To the system, it appeared to be a typical user logging in and logging out, nothing out of the ordinary.</li>
<li style="margin-bottom: 15px;"><strong>Be sure you set up MFA at your bank.</strong> Ask if they support you logging in with a physical token, an authenticator app on your phone or using a passkey, all of which are more secure than a text message. Even then, know that hackers can bypass MFA, so it cannot positively prevent a threat actor from accessing your account. But use MFA anyway.</li>
<li style="margin-bottom: 15px;">Here&#8217;s the <strong>technical stuff to send to IT</strong>, but executives, please read the next section after this section.
<ol style="list-style-type: lower-alpha; margin-top: 10px;">
<li style="margin-bottom: 10px;">Ask them to enable Spoof Intelligence in Microsoft 365 Defender</li>
<li style="margin-bottom: 10px;">Ensure Anti-Spam Policy &gt; Spoof settings blocks failed SPF and DMARC internal spoof attempts</li>
<li style="margin-bottom: 10px;">Enable domain and user impersonation protection in an Anti-Phish Policy for your Accepted Domains</li>
<li style="margin-bottom: 10px;">Disable or at least restrict any inbound connectors that accept mail from untrusted IPs</li>
<li style="margin-bottom: 10px;">Add an Exchange Mail Flow transport rule so that if a message is authenticated as Anonymous but claims to be from inside your domain, check the message: If AuthAs=Anonymous AND InternalOrgSender=True, treat it as external and run spam and phishing filters again.</li>
<li style="margin-bottom: 10px;">Be sure your IT Department has configured technology they will recognize called SPF, DKIM, and DMARC to help protect you from fraudulent email messages. But they need to implement it in phases to ensure you don&#8217;t lose essential messages and that your company&#8217;s outbound email messages don&#8217;t get blocked due to the settings. They can start SPF with ~all (soft fail) while monitoring, then move to -all (hard fail) for SPF after they&#8217;ve identified all the approved sources of email, and separately configure DMARC to progress from p=none &gt; p=quarantine &gt; p=reject over time. Important: Don&#8217;t move DMARC to p=reject until both SPF and DKIM are properly configured and aligned, as this could block legitimate emails.</li>
</ol>
</li>
<li style="margin-bottom: 15px;">You already have <strong>incident response plans</strong> for what happens if there is a security breach, and be sure to have one for fraudulent wire transfers, too.
<ol style="list-style-type: lower-alpha; margin-top: 10px;">
<li style="margin-bottom: 10px;">Include immediate notification of your bank, cyber-insurance carrier, the FBI, your data breach lawyer, and the executives of your organization. Include all contact information right in the plan so there are no delays. Sometimes, when money gets transferred to a fraudulent account, the threat actors cannot access the full amount right away; they must remove the money in smaller increments. Sometimes you can recover some of the money if you act quickly. Other times, the funds are moved immediately to overseas mule accounts.</li>
<li style="margin-bottom: 10px;">Include an instruction to ask your IT department to immediately run an Exchange message trace on the specific messages related to the fraud; they&#8217;ll understand the request.</li>
<li style="margin-bottom: 10px;">Ask IT to also check the admin audit logs for recent rule/connector modifications.</li>
</ol>
</li>
<li style="margin-bottom: 15px;">To combat the voice-print dangers, you need to consider both someone impersonating your company to the bank, and someone pretending to be the bank calling you. For the former, ask your bank to <strong>require multiple forms of authentication, not just voice-print.</strong> They will probably suggest pre-arranged code words or security questions that only you and your bank know. Here’s something many people learn the hard way: Do not answer with a fact. In other words, you might say your high school was Sea of Tranquility High on the Moon. Good luck to any attacker trying to find that on your LinkedIn profile, even if they are using AI to assist them! And if someone calls you claiming to be from your bank, hang up and call the bank back on a number you can verify as being legitimate.</li>
<li style="margin-bottom: 15px;">And last, it is an excellent idea to <strong>ensure everyone who pays you by wire transfer</strong> does everything in this document and more. After all, if they pay all the money they owe you to a fraudster, they might not have enough money left to pay you, too. We&#8217;ve seen that happen to some of our best clients; their customers suffered a BEC and transferred money to threat actors, and then couldn&#8217;t afford to pay our customers. This is an example of how another company&#8217;s breach can hurt your organization, too.</li>
</ol>
<p style="margin-bottom: 20px;">This simple process could save you many hundreds of thousands of dollars, as fraudulent emails requesting wire transfers are becoming too frequent. Review your policy today and have a table-top exercise this quarter.</p>
<h3 style="margin-bottom: 15px;">About the Author</h3>
<p style="margin-bottom: 10px;"><strong>Mike Foster, CISSP®, CISA®</strong><br />
Cybersecurity Consultant and Keynote Speaker<br />
📞 805-637-7039<br />
📧 mike@fosterinstitute.com<br />
🌐 www.fosterinstitute.com</p>
<p style="margin-bottom: 15px;">Mike Foster is a leading cybersecurity consultant with decades of experience helping organizations across North America secure their digital assets. He holds CISSP® and CISA® certifications and is the author of The Secure CEO. As the founder of The Foster Institute, Michael has delivered over 1,500 keynote presentations and consulting engagements, equipping executives and IT leaders to strengthen their cybersecurity posture and defend against evolving threats.</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/wire-transfer-fraud-just-got-smarter-your-defenses-need-to-catch-up/">Wire Transfer Fraud Just Got Smarter &#8211; Your Defenses Need to Catch Up</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>E-Mail Protection Solution</title>
		<link>https://fosterinstitute.com/e-mail-protection-solution/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 16 Mar 2017 21:18:29 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mimecast]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Targeted Threat Protection]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Wire Transfer Fraud]]></category>
		<category><![CDATA[Bad Attachment]]></category>
		<category><![CDATA[Computer Virus]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[email insurance]]></category>
		<category><![CDATA[Email Protection]]></category>
		<category><![CDATA[firewalls]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Infected files]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[IT Virus]]></category>
		<category><![CDATA[malicious file]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Transfer Money Scams]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2442</guid>

					<description><![CDATA[<p>Everyone is concerned about the danger of a user clicking on a link in an email message, perhaps invoking a ransomware attack, or users responding to requests to transfer money. There are tools that will help.FYI: We do not receive any kind of compensation or payment for recommending products, nor do we endorse any of [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/e-mail-protection-solution/">E-Mail Protection Solution</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Everyone is concerned about the danger of a user clicking on a link in an email message, perhaps invoking a ransomware attack, or users responding to requests to transfer money. There are tools that will help.<span id="more-2442"></span>FYI: We do not receive any kind of compensation or payment for recommending products, nor do we endorse any of them.</p>
<p>An example tool that can help protect against users opening or clicking in an email is Mimecast Targeted Threat Protection. At least one of our clients use this tool and now we do too.  There are similar solutions that may work better in your situation.</p>
<p>Here’s what the tools do: When an inbound email contains one or more links and a user clicks, Mimecast will intercept the link and attempt to determine if the link goes to a website that is known to be malicious. If it is a known bad site, the click is blocked and the user receives a message. Your existing firewall (if you have the web content filtering feature enabled) may provide you with similar protection already for users inside your office, but not always for users who are travelling or working from home.</p>
<p>These tools scan email attachments in an effort to detect malicious code in the attachments. Your existing spam filtering mechanism may offer this feature.</p>
<p>Mimecast will also block email messages that seem to be from impostors. When a user receives an email that appears to be from someone impersonating the boss, requesting a wire transfer, the service will warn the user to be careful.</p>
<p>While there are no guarantees this kind of tool will stop an email phishing attack, any kind of protection is a welcomed improvement. Ask whomever is providing your anti-spam solution if they offer an add-on solution similar to Mimecast’s Targeted Threat Protection.</p>
<p>Please forward this to everyone you know who is concerned about their users clicking a link in an email message, opening an infected attachment, or responding to an email asking them to transfer money.</p>
<p>The post <a href="https://fosterinstitute.com/e-mail-protection-solution/">E-Mail Protection Solution</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization</title>
		<link>https://fosterinstitute.com/finally-a-solution-to-solve-what-may-be-the-biggest-cyber-security-risk-at-your-organization/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 12 Dec 2016 17:00:32 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Spam Phishing]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[Wire Transfer Fraud]]></category>
		<category><![CDATA[Authetnic8]]></category>
		<category><![CDATA[Bad Link]]></category>
		<category><![CDATA[Biggest Security Risk]]></category>
		<category><![CDATA[Citrix]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Email Link]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hosted browser]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[malicious websites]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Wire transfer fraud]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2404</guid>

					<description><![CDATA[<p>It happens all the time: A user clicks on a link in an email message, and the computer gets infected. Ransomware can lock up the data on the drive or even your servers. Sensitive data can be stolen, wire transfers attempted, and other bad things can happen. When a user is tricked into clicking on [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/finally-a-solution-to-solve-what-may-be-the-biggest-cyber-security-risk-at-your-organization/">Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It happens all the time: A user clicks on a link in an email message, and the computer gets infected. Ransomware can lock up the data on the drive or even your servers. Sensitive data can be stolen, wire transfers attempted, and other bad things can happen. When a user is tricked into clicking on a bad link, the link instantaneously takes the user to a malicious website. It may even look like a real website or pop-up window. Now the attackers win.</p>
<p>A drastic solution is to <span id="more-2404"></span>uninstall all browsers. Browsers can’t get hacked when they don’t exist. You can switch to hosted browser service that runs browsers in the cloud, not on your computer.</p>
<p>To see how this works, watch the short videos at authentic8 dot com and Citrix dot com/virtualization/secure-browser </p>
<p>This newsletter is targeted to executives who don’t need to understand technology, so you may choose to forward the following technical information to your IT Department.</p>
<p>And please forward this to anyone whose cybersecurity you care about.</p>
<p>For our more technical audience: As of today, only authentic8’s solution supports general web browsing, but both support web applications.</p>
<p>Since these services put security first, and functionality a close second, you may still need a local browser for some applications if they don’t function properly in the hosted browser environment. But, if that is the case, you may be able to remove Flash and Java from your systems to make your local browsers more secure.</p>
<p>The biggest problem with both products is that they do not have a way to be set as the default browser to be used if a user clicks inside an email message. So, if you must leave a local browser installed, your users will still need to be careful about clicking links in email messages. The solution may be available soon.</p>
<p>Hosted browsers still protect your computers during web browsing sessions. And it becomes practically impossible for an attacker to use a hosted browser to access the sensitive data stored on your network drives.</p>
<p>Investigate using a hosted browser for added protection against the many threats on the Internet that exploit browsers and plugins such as Flash and Java.</p>
<p>The post <a href="https://fosterinstitute.com/finally-a-solution-to-solve-what-may-be-the-biggest-cyber-security-risk-at-your-organization/">Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Alert – ACH and Wire Transfer Fraud at Epic Levels</title>
		<link>https://fosterinstitute.com/alert-ach-and-wire-transfer-fraud-at-epic-levels/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 07 Apr 2016 19:39:06 +0000</pubDate>
				<category><![CDATA[ACH Fraud]]></category>
		<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Wire Transfer Fraud]]></category>
		<category><![CDATA[ACH fraud]]></category>
		<category><![CDATA[ACH Hackers]]></category>
		<category><![CDATA[bank scams]]></category>
		<category><![CDATA[bank theft]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[cyber theft]]></category>
		<category><![CDATA[epic level fraud]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[money frauds]]></category>
		<category><![CDATA[money hackers]]></category>
		<category><![CDATA[money scames]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Wire transfer fraud]]></category>
		<category><![CDATA[Wire Transfer Hackers]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2287</guid>

					<description><![CDATA[<p>Everyone – this is urgent – we are seeing an enormous increase in users being duped into making unauthorized transfers. The attackers are very, very good at tricking people – often using multiple communications in order to build trust. You absolutely must take the following steps to help protect you and your organization. Anything involving [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/alert-ach-and-wire-transfer-fraud-at-epic-levels/">Alert – ACH and Wire Transfer Fraud at Epic Levels</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Everyone – this is urgent – we are seeing an enormous increase in users being duped into making unauthorized transfers. The attackers are very, very good at tricking people – often using multiple communications in order to build trust. You absolutely must take the following steps to help protect you and your organization.<span id="more-2287"></span></p>
<p>Anything involving an ACH or a wire transfer request should immediately raise a huge red flag for every single user in all organizations.</p>
<p>Send the following to your customers, prospects, and everyone with whom you do business:</p>
<p>If you receive any kind of communication, asking for an ACH or wire transfer to (your organization), it is a brazen attempt by fraudsters to steal money. Ignore requests sent via invoice, email, fax, snail mail, phone call, social media, text message, overnight letters, and by any other form of communication. Even if the communication contains logos and looks official, ignore it. If the wire transfer request provides a printed or verbal phone number to phone (your organization) to get approval, do not believe that phone number. It probably goes to a call center managed by attackers. If you want to phone us, please do so by calling the number you have on file, or the number listed on our website. Do not reply to any email messages. The reply is likely to go to the fraudsters. They will continue to bluff you. Please alert everyone in your AR department, and anyone else who has authorization to make wire transfers to never transfer money to (your organization).</p>
<p>And, of course, if you do business using wire transfers, notify them that if they ever see a request to transfer money, they need to call, by voice, a specific person at your office each time, a person you specifically identify to them ahead of time, at a specific phone number, to confirm the accounts and all details prior to transferring any money to you. </p>
<p>And, the request does not necessarily indicate you’ve been hacked. But – if the fraudsters know things such as your customer names, current projects, deals that are about to close, invoices, and any other similar information, you should suspect the possibility of a breach of you or the other party. If the fraudsters know when key people are out of the office, that should raise your level of suspicion even higher. The attackers stand to gain huge financial rewards when they successfully receive money wired to them, so they are willing to invest the time to infiltrate your systems in order to gather information that will make their fraudulent attack appear to be a legitimate request.</p>
<p>Please forward this email message to everyone you care about. For some reason, companies just don’t think this will affect them, until it does. This is becoming a national crisis.  Tell them: Yes, this means you!</p>
<p>The post <a href="https://fosterinstitute.com/alert-ach-and-wire-transfer-fraud-at-epic-levels/">Alert – ACH and Wire Transfer Fraud at Epic Levels</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
