Let us help you find the resources you need.

Operating your business can be a daunting task. From growing your business to keeping up with the latest online solutions, we know that time is one of the most important assets a business owner must manage. The C&F Resource Center is designed to save you time and help you learn best practices and receive information from other business owners and experts who have faced some of the same challenges as you. Our goal is to help your business succeed. We hope you enjoy this information.

Cyber Thieves Stepping up Phishing Attacks on Businesses

At C&F Bank, we believe in educating our customers and want to provide you some tips... read more

Your Financial Wellness

Business Financial Wellness

Information and these calculators are made available by one or more third party service providers. All examples are hypothetical and are for illustrative purposes. C&F Bank cannot guarantee that the information provided or the calculators are accurate, complete, or timely. Federal and state laws and regulations are subject to change. Changes in such laws and regulations may have a material impact on pre-and/or after-tax investment results. C&F Bank makes no warranties with regard to these calculators or the results obtained by their use. C&F Bank disclaims any liability arising out of your use of these calculators.

Open an Account

Call or stop by any of our bank locations today and speak with one of our relationship managers.

Find a Location

 

Cyber Thieves Stepping up Phishing Attacks on Businesses

Cyber Thieves Stepping up Phishing Attacks on Businesses

Based on the latest statistics, identity thieves and cyber-fraudsters are stopping at nothing in their pursuit of your sensitive information and your money. According to Anti-Phishing Working Group inc., phishing attacks are increasing at an alarming rate with as many as 6 million occurring in the first quarter of 2016. That is a 786 percent increase over the prior year. Not only are they becoming more prevalent, they are taking on many more forms, with more than 197,000 variants swirling around in cyber space. Worse, they are becoming far more effective, more sophisticated and more nefarious. Consider that, in 2015, the FBI reported more than 7,000 successful scams involving nearly $750 million from U.S. businesses. With that kind of take, you can expect cyber thieves to become even more relentless in pursuit of your money.

Recognizing a Phishing Attack

Chances are you have been the target of a phishing scam. Most phishing emails show up in your inbox appearing as a somewhat legitimate message from a bank, a retailer, a service company, a government agency or even someone from within your business. It may even include your name in the salutation. In the email you might find an alert about an account that needs updating, a question about recent order you placed, a request to complete a survey or a warning about an account that is about to be closed – messages designed to get you to click on an imbedded link.

Should you click on the link, you will be directed to a website that looks legitimate, but it’s not. Should you enter your login credentials as you are asked to do, you will be giving the phisher all it needs to impersonate you on the actual website, where it will proceed to drain your account or spend your money. However, if you recognized the email as a phishing scam, you simply deleted it and moved on –until the next one to hit your inbox.

More Businesses Paying Ransom for Data

The more insidious phishing scam includes an attachment, which, if you should open it, will deploy an encrypted malware that proceeds to lock down your data. It will then display a message informing you that your data can be retrieved in exchange for a ransom. Ransomware is the fastest growing phishing scam, accounting for more than half of all attacks because it is often successful. It is by far the easiest of all cyber attacks to monetize and provides a quick return on investment. Because the price point of the ransom is typically low, in the range of $500 to $1,000, the victims, which tend to be small to medium-sized businesses, pay quickly rather than expend the resources required to recover the data by other means.

Spear Phishing Harder to Detect

As evidence of the growing sophistication of cyber thieves, an increasing number of individuals and businesses are being targeted by spear phishing. Whereas traditional phishing targets a broad and random set of email accounts, spear phishing emails are designed to look as if they originate from someone you know and trust, such as a colleague or a superior. The subject line may include a reference to a particular project or relevant industry information. The attacker may have studied your Facebook, Twitter or LinkedIn accounts to gather the intelligence used to impersonate a person of trust. As with ordinary phisher mail, it will include an attachment or link, that when opened, will unleash a malicious virus such as ransomware or an undetectable spybot that can drill into the backdoor of your network and siphon off sensitive data.

You are the First Line of Defense

Phishing emails are especially effective because, once they land in an inbox, their viruses can elude a network’s firewall protection or security system; and the attacks reported by businesses today are not coming from penny-ante fraudsters operating out of their basements; rather they are devised and launched by major crime organizations, international in scope, with the resources to stay one step ahead of security systems. That means you and your employees will always be the first and last line of defense. It requires continuous vigilance by everyone operating a computer to prevent a phishing attack. Cyber thieves are getting smarter, but their phishing attacks can still be detected when you know what to look for:

False “From” address: You may receive an email from a business that looks legitimate, but a closer look might reveal a misspelling or an extra dash or underscore. Often times the lower cap letter “L” is replaced with the number “1”.

Generic salutation: Emails that don’t include your name in the salutation are spam and should be deleted.

 “Phishy” salutation: If you see any other form of your name other than your proper first or last name in the salutation, delete the email. For example, if you see your email moniker (i.e., smjohnson) as the salutation, delete the email.

Urgent call-to-action: If the message includes an urgent call-to-action, such as “action required” or “your account will be closed,” give the email some extra scrutiny.

Request for sensitive information: Legitimate businesses never ask for sensitive information in an unsolicited email.

Fake links: Links can be made to look like the real thing. Look to see if the company name is spelled correctly and is in the right location in the link. Also, look for the https:// in the URL address. If it doesn’t include the “s”, it is probably a fake.

C&F Bank is passionate about the safety and security of your hard earned money. For this reason we are dedicated to educating you about fraud and how you can protect yourself and your business against loss. There is no better defense against security attacks than becoming thoroughly educated about the risk and arming yourself and your employees with knowledge. We encourage you to visit our website at www.cffc.com/Fraud-Awareness.aspx for more information on fraud protection.

Back to Top