Phishing Example

Phishing is a type of online scam where an attacker uses fraudulent emails, text messages, or other means of communication to trick individuals into providing sensitive information such as passwords, bank account information, or credit card numbers.

Phishing email catches company out by turning on the charm

Phishing emails are the most common of all the cybercrime threats out there

Based in the South of England, our company is at the forefront within their marketplace. Part of their success comes from the fact the company is a friendly place to work. Everyone is dedicated to their role within the organisation.  

Phishing emails are the most common of all the cybercrime threats out there. They rely solely on deception; designed to trick a person into disclosing valuable information or money or both. 

“Our company received an email that led a member of the team to believe that the person sending the email was a Director of the company, so the content of the email was not challenged”.  

83% of businesses in the UK receive phishing emails. 27% (Gov.uk) of those emails will be ‘impersonation attacks’ that is someone from outside the organisation impersonating a person within the organisation. 

A fake email was sent to the company requesting that an invoice be paid, the bank details, however, had been changed, so that the criminals account was paid, and not the real customer. 

What happened to them could happen to anyone. 

The Challenge​

A team member was tricked by an email from an outside source. It appeared to have been sent in by one of the company’s management team. The fake Director drew the staff member into the conversation via email; rather than going straight to ‘can you send me money. The cybercriminal played on the staff members loyalty to the company, before asking them to send money to their criminal bank details.   

Businesswoman Making Presentation To Office Colleagues In Smart/Casual Dresswear

83% of businesses in the UK receive phishing emails. 27% (gov.uk) of those emails will be ‘impersonation attacks’!

The Solution​​

  • Setting out a multi-layered plan to improve the company’s defences against such attacks in the future 
  • Staff Training How to spot the work of cybercriminals 
  • Internal changes, like checking the validation of payments
  • Better Anti-Spam & phishing protection 
  • CNC Complete Security Protection Standard 
  • MFA installed 
  • Change of passwords systemwide  
  • Improved working procedures with emails and logins Creating zero-trust initiatives across the whole company, helping with the cultural shift for successful implantation 
  • Set up reporting process for suspicious emails 
CNC-icons_quote-mark

It could have been worse. Luckily it wasn’t. We could have done without the experience. Having said that, we are now in a much better position, we have installed a full security package to wrap around the company, and its brought about a muchneeded change in how each member of the team looks at protecting the company. Thank you, CNC for sorting for us

IT Manager

The Benefits

CNC offers an end-to-end cyber security consultation and implementation service. Call us now on 01273 384100 on how we can protect your business

Cybersecurity strategies

Building a zero-trust network within a company is one of the most effective cybersecurity strategies available to an organisation. Trusting nothing without the proper authorisation is essential when it comes to doing digital business.

Safe IT environment

It has been quite a departure for the company, to create such an agnostic IT atmosphere, and to enshroud the company’s network, which was culturally different.

Company wide solutions

With the whole company and its IT working together, they will effectively stop anything like this from happening again.

Let's talk

We are always open for a chat so get in touch to find out how we can help.