This page contains a Flash digital edition of a book.
BUSINESS CRIME & PROTECTION


Get to grips with email security


By RICHARD SMITH, Managing Director, Basic Business Systems


Richard Smith of Basic Business Systems


‘If an email contains a zip file or attachments that have not been requested, be very cautious as they may contain a virus’


In the business world, the majority of communication is done by email, making it hard for people to keep on top of their burgeoning inboxes. It’s easy to fall into the habit of ignoring email management,


of failing to check the origination of an email before clicking on it or considering whether it should be opened. Knowing what to look for and how to identify fake or


phishing emails would, however, keep IT systems safer. There are some very simple ways to identify rogue emails. Any messages demanding the recipient to take ‘urgent’


action can usually, and should, be ignored. A common trick of email scammers is to try to trick the


target into clicking a link by suggesting that if they don’t take action immediately, they could receive some sort of penalty. The penalty comes if they’re silly enough to click the link. These emails should be deleted as quickly as possible, even


if the name of the sender is recognised. If an email contains a zip file or attachments that have not


been requested, be very cautious as they may contain a virus. Word and Excel documents which need macros enabling


are also a huge red flag. Don’t open such emails, delete them. An email claiming to be from a reputable company, but


which is uncharacteristically littered with spelling and grammatical errors is almost certainly from a questionable


source and definitely not the company from which it purports to originate. If the email offers something that seems to be too good to


be true, it probably is. Scammers will often try to trap targets into supplying


personal information to enter competitions they make seem that the recipient has already won. There is no prize, only loss once the hacker has access to the target’s systems. Make sure all staff know how to spot a potentially


dangerous email and that they know not to open them. If a dangerous email or link is opened and an encryption


virus attacks, the only real solution is to restore data and systems from a recent back-up. A vital component of a good backup schedule is to periodically test the back-ups to confirm they are working. Finally, as a victim, make sure you report it to www.actionfraud.police.uk/report_fraud


FEATURE


business network June 2016 39


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56