The Catfish Con

September 14, 2021

 

The security risks associated with fake accounts on social media accounts are created to catfish; con people out of money; and for other kinds of exploitation. But did you know that fake accounts can be created for other services too? Most of the businesses we interact with now need you to create an account. Think food ordering, online shopping, maybe even for businesses like yours. But what’s the harm in that, right? These fakes won’t be creating accounts on your website to trick you into anything. They won’t be able to access your products or services for free. Aside from creating spam in your CRM, what’s the problem?
Actually, these fake accounts can result in huge fraud. Recently, for example, the US Secret Service announced it had recovered $2 billion in fraudulent Covid-19 relief claims. And it’s on the rise, because there are now software tools which automate account creation and mask real identities. In the world of retail, bots exist to buy up limited edition or highly desired items, with a view to reselling them for a higher price. And the lengths these bots go to, in order to make fake email accounts look like real humans is incredible. They sign up to mailing lists, send emails, watch YouTube videos, all to build up normal email account activity, before creating accounts with the desired retailer, ready for the drop. When the item is released, these bots are all logged in and checking out at the same time, making it next to impossible for real humans to make a purchase. While this may not directly affect your business in this way, it’s making it very difficult for all of us to be recognized as real individuals online. It may be only a matter of time before this is recognized as a form of fraud.

Have you considered how fake account fraud could affect your business? Perhaps it’s time to take a look at the way accounts are created to do business with you.

Avoiding Ransomware Attacks: Follow-up

RDP stands for Remote Desktop Protocol, and it’s how you and your team connect to your business network using your laptops when you’re away from the office. So, a pretty essential piece of technology these days.
But because anyone can reach an RDP through the internet, that does present a security risk. In fact, attacks on RDPs surged by 768% in 2020. And 47% of ransomware attacks start with the RDP being compromised in some way.

So, what do you do to protect your business from becoming a victim?

  1. Set up Multi-Factor Authentication across your devices. This is where you have to generate a code on a separate device to prove it’s really you logging in
  2. Limit who can access your network by setting up Access Control Links. This is like a security guard on the door deciding who can get in, and who can’t
  3. Set up a Virtual Private Network. This is an encrypted ‘tunnel’ for your connection into your business. No-one else can see what info you’re sending or receiving.

Cybersecurity with Lighthouse Technology Partners
Lighthouse Technology Partners is an award-winning, strategic IT Provider delivering managed IT services, cyber security and cloud consulting for the modern workplace. We have over 35 years dedicated to bringing enterprise-ready solutions and security to small and mid-sized businesses across North America.

Have questions? Feel free to contact Lighthouse Technology Partners today for a free consultation.