What kinds of methods and tricks are cyber attackers using these days to get into your system? The most common is BEC - Business Email Compromise. The attackers are doing their homework and checking out what platforms your organization is using and who the leaders are. They can fake credential information and may even create a fake identity to use to spread the email.
Another thing we see a lot is using a common shared platform, like Google Docs or Microsoft Sheets. Because it is a platform that your organization is using, the receiver thinks it is a typical document and is not suspicious of the link. The attackers are using a common platform that the company uses to share and distribute their malicious software.
You need to be very cautious when opening emails, especially from people that you don’t know. Even when you receive something from someone you know, it can be wise to check with them to verify it is something they sent to you. However, you want to do this with a phone call so you don’t inadvertently pass along a threat. If you have any questions or concerns regarding your cybersecurity plan, reach out to us. We can help with that.