<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CEO Fraud Archives - L2 Cyber Security Solutions</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/ceo-fraud/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/ceo-fraud/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 18 Feb 2021 19:46:30 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>CEO Fraud Archives - L2 Cyber Security Solutions</title>
	<link>https://www.l2cybersecurity.com/tag/ceo-fraud/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 066 Money Mules</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-066-money-mules/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 19 Feb 2021 02:15:59 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Bank Account Fraud]]></category>
		<category><![CDATA[CEO Fraud]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Fake Invoice]]></category>
		<category><![CDATA[Invoice Redirect Fraud]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Money Laundering]]></category>
		<category><![CDATA[Money Mules]]></category>
		<category><![CDATA[Money Transfers]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Wire Transfers]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2457</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 66. This week were going to talk about Money Mules. Where is this coming from? Have you ever wondered how the criminals who scam businesses out of lots of money through the use of fake invoices, invoice redirect fraud, CEO fraud, how do they move that money around? They use money&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-066-money-mules/">#WeekendWisdom 066 Money Mules</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 66. This week were going to talk about Money Mules.<span id="more-2457"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2457-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/02/WeekendWisdom-066-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/02/WeekendWisdom-066-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/02/WeekendWisdom-066-lo.mp4</a></video></div>
<h3>Where is this coming from?</h3>
<p>Have you ever wondered how the criminals who scam businesses out of lots of money through the use of fake invoices, invoice redirect fraud, CEO fraud, how do they move that money around? They use money mules.</p>
<h3>Who are these Money Mules?</h3>
<p>Money mules are people who have been recruited by the criminals. They&#8217;re generally just ordinary people who are maybe a bit hard up and need a bit of extra cash. They are recruited by the criminals to just make use of their bank accounts.</p>
<h3>How does this work?</h3>
<p>So the criminals will transfer funds in from the businesses that they steal from. They put it into the money mules account and they&#8217;ll be given instructions about where to send that money onto. The money mules would be paid a commission for doing so.</p>
<h3>Where do they find them?</h3>
<p>They usually recruit people like students or the unemployed. As I say, it&#8217;s people who are in need of money. They use slick ads, I&#8217;ve seen some of them on Facebook, that say</p>
<blockquote><p>This Limerick mother of two earns €3,500 a week!</p>
<p style="padding-left: 40px;">or</p>
<p>This Dublin man earns €3,400 a week!</p></blockquote>
<p>Slick ads, easy money. It&#8217;s always just too good to be true.</p>
<h3>Is there anything wrong with that?</h3>
<p>It is also a crime.</p>
<p>So if you yourself or if you know somebody who is acting as a money mule, please stop doing so now or get them to stop doing so now. Report the matter to An Garda Síochána or your local law enforcement.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-066-money-mules/">#WeekendWisdom 066 Money Mules</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/02/WeekendWisdom-066-lo.mp4" length="30815290" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 039 Bank of Ireland Cyber Fraud</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-039-bank-of-ireland-cyber-fraud/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 30 Jul 2020 23:05:17 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Bank of Ireland]]></category>
		<category><![CDATA[Bank of Ireland Cyber Fraud]]></category>
		<category><![CDATA[BEC]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[CEO Fraud]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2243</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 39. This week we&#8217;re going to talk about Bank of Ireland Cyber Fraud. Earlier this week, the Bank of Ireland was fined over €1.6 million for failures in relation to a Cyber Fraud case from back in 2014. How did Bank of Ireland suffer Cyber Fraud? What happened back then was&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-039-bank-of-ireland-cyber-fraud/">#WeekendWisdom 039 Bank of Ireland Cyber Fraud</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 39. This week we&#8217;re going to talk about Bank of Ireland Cyber Fraud.<span id="more-2243"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2243-2" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-039-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-039-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-039-lo.mp4</a></video></div>
<p>Earlier this week, the <a href="https://www.irishtimes.com/business/financial-services/bank-of-ireland-fined-1-66m-for-failings-amid-cyber-fraud-1.4315693" target="_blank" rel="noopener noreferrer">Bank of Ireland was fined over €1.6 million</a> for failures in relation to a Cyber Fraud case from back in 2014.</p>
<h3>How did Bank of Ireland suffer Cyber Fraud?</h3>
<p>What happened back then was a client of their Private Banking arm had their email account compromised by some cyber criminals. They sent an email to the Bank of Ireland staff requesting them to make payments of some €106,000 and the bank staff followed through on those instructions and made the payments.</p>
<p>The client subsequently realised the fraudulent transactions on their account. They notified the bank which immediately refunded the amounts to the client.</p>
<h3>Why did they get fined?</h3>
<p>However they did not report the matter to An Garda Shíochána in good time and they also did not highlight the incident correctly to the Central Bank of Ireland, the Irish regulator. So for those reasons they were given this significant fine.</p>
<h3>If a bank can fall for this, how can I stop that happening in my business?</h3>
<p>As I mentioned back in <a href="https://www.l2cybersecurity.com/weekendwisdom-031-ceo-fraud/" target="_blank" rel="noopener noreferrer">#WeekendWisdom number 31</a>, this is very, very much like a CEO fraud or business email compromise. So the advice then still stands. Never carry out payment instructions based on an email alone.</p>
<p>Always seek verification of a payment instruction by way of maybe a telephone call. Only use a number that you have on file for that authorised person. Just never act on an email because compromising email accounts is incredibly easy.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>. This training can show your staff how this type of fraud is committed so they can be recognise it if the cyber criminals try it on them.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-039-bank-of-ireland-cyber-fraud/">#WeekendWisdom 039 Bank of Ireland Cyber Fraud</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-039-lo.mp4" length="24520226" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 031 CEO Fraud</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-031-ceo-fraud/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 05 Jun 2020 08:38:57 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[BEC]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[CEO Fraud]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2021</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 31. This week we&#8217;re going to talk about CEO fraud. What is CEO Fraud? It is a type of scam that is perpetrated by organised criminal gangs where they will send an email, apparently coming from the CEO of that organisation. It will be sent to the CFO, financial director or&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-031-ceo-fraud/">#WeekendWisdom 031 CEO Fraud</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 31. This week we&#8217;re going to talk about CEO fraud.<span id="more-2021"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2021-3" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/06/WeekendWisdom-031-lo.mp4?_=3" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/06/WeekendWisdom-031-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/06/WeekendWisdom-031-lo.mp4</a></video></div>
<h2>What is CEO Fraud?</h2>
<p>It is a type of scam that is perpetrated by organised criminal gangs where they will send an email, apparently coming from the CEO of that organisation. It will be sent to the CFO, financial director or accountant. They request that some invoice or an outstanding amount is paid urgently and by electronic funds transfer (EFT) to a new account. Details of this new account are then provided for the money to be transferred into.</p>
<p>It will also be implied in the email that the CEO is unavailable to take a telephone call to verify the instruction. They might be in a meeting or getting on board flight. So if the CFO, finance director or accountant makes that payment, that money is gone and it would be irrecoverable usually.</p>
<h3>How big a deal is it?</h3>
<p>It is a huge deal! In fact CEO fraud, or as they call it in the US, Business Email Compromise (BEC), it was actually the number one type of cybercrime by value in 2019. Some $1.7 billion dollars were lost to CEO fraud. Nearly 24,000 victims of that crime in 2019 in the US. So it&#8217;s quite significant.</p>
<h3>How can you protect against it?</h3>
<p>The simple way to protect against this is that no matter what the situation any email correspondence to instigate a payment must be verified by a follow-up telephone call. It has to be carried out. There must be another verification step there in order to validate the instruction.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<span style="color: #ff0000;"><strong>*</strong></span>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><span style="color: #ff0000;"><strong>*</strong></span>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-031-ceo-fraud/">#WeekendWisdom 031 CEO Fraud</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/06/WeekendWisdom-031-lo.mp4" length="22736433" type="video/mp4" />

			</item>
		<item>
		<title>Could the attempted theft of €4.3m from Meath County Council happen to your business?</title>
		<link>https://www.l2cybersecurity.com/meath-county-council-scammed/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 22 Dec 2016 09:23:23 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[CEO Fraud]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spear-Phishing]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=471</guid>

					<description><![CDATA[<p>As was widely reported at the weekend, Meath County Council were the victim of an attempted theft of some €4.3 million. A lot of the reportage was pointing to hackers and this being a cyber attack, but based on what is known, in my opinion, it&#8217;s not really. This attempted theft was facilitated by the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/meath-county-council-scammed/">Could the attempted theft of €4.3m from Meath County Council happen to your business?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft" src="https://4.bp.blogspot.com/-jkJnX039VCQ/WFq2YmKI0-I/AAAAAAAAA7U/12qdIiN6IHMdFP8yCP-LDHp6C8PmnL1ygCLcB/s1600/MeathCoCo.jpg" alt="Meath County Council" width="180" height="180" /></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">As was widely <a href="https://www.irishtimes.com/news/ireland/irish-news/meath-county-council-confirms-attempted-cyber-attack-1.2910180">reported</a> at the weekend, Meath County Council were the victim of an attempted theft of some €4.3 million. A lot of the reportage was pointing to hackers and this being a cyber attack, but based on what is known, in my opinion, it&#8217;s not really.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This attempted theft was facilitated by the use of technology, but not necessarily the abuse of it. They&#8217;re no longer commenting about it now while the matter is investigated, so we&#8217;ll need to await the outcome of that before we know for sure.</span></p>
</div>
<p><span id="more-471"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">However this sort of theft is incredibly common and is known variously as CEO fraud or Business Email Compromise (BEC). Basically what the bad guys do, is send an e-mail or even a text message that appears to come from the CEO, the MD, the Head Honcho, the Big Boss. This e-mail/text is sent to somebody in the finance department and it instructs them to urgently transfer or wire funds to some account that is outside of the EU area. If the transfer was within the EU area, it can be recalled under SEPA regulations, but outside of the area the money can be a taken and never seen again. </span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">If, in your business, you have a finance function (however big or small) that has a single person who is able to initiate a transfer of funds in any amount, on their own, then you could easily fall victim to this type of fraud. The thieves will have done research on your organisation and will know who is involved in the various departments and how you operate. This enables them to make their e-mail/text much more believable.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">The FBI in the US have <a href="https://www.fbi.gov/contact-us/field-offices/phoenix/news/press-releases/fbi-warns-of-dramatic-increase-in-business-e-mail-scams">reported</a> that this fraud has occurred in 80 countries. From October 2013 to February 2016, there have been over 17,600 victims with total losses amounting to over $2.3 billion &#8211; that&#8217;s an average of just over $130,000 from each victim. This whole area is increasing rapidly and this will happen more and more.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">So what can you do to prevent it happening to you?</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Well quite simply, have the banking set-up, such that at least two signatories are required for every transaction, no matter the size. Then follow this up with a strict policy on how money transfers can be requested &#8211; particularly where the target account is new. If you are simply transferring to a known, established account (belonging to a vendor you deal with for example), then this should be OK (as long as there is a supporting invoice of course). However, if an e-mail requests the transfer of funds to an unknown account, then certain due diligence should kick in. For example, the CEO/MD/Whatever should be contacted by phone and additional verification sought. If the CEO cannot be contacted, then there should be no further action taken until they are reached. Very importantly, the CEO needs to acknowledge this policy and never subvert it, no matter what.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">As mentioned earlier, the thieves will have done their homework on the company. The true story I tell during the <a href="http://www.l2cybersecurity.com/#ourservices">Internet Security Awareness and Safety Training</a> is about the finance director of a company receiving an e-mail from his boss asking him to urgently transfer funds to a client account in order to secure a new contract. As it&#8217;s for a new contract, it&#8217;s to go to a new account. Also the amount of the funds is just within the Finance Directors approval range for a solo authorisation. The CEO concludes the e-mail saying that he is just getting onto a long haul flight, so he will now be incommunicado for several hours.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">The CEO was indeed travelling long haul that day, which the Finance Director knew, so it all looked fine, so he sets up the transfer on the system and is about to process it when a niggle hits him. There was just something that wasn&#8217;t quite right, so he chanced calling the CEO, who answered from the departure lounge at the airport. Of course there had been no e-mail sent by the CEO &#8211; it was all a hoax. But if the Finance Director didn&#8217;t have that niggle to call, the money was gone, never to be seen again.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">So put a strong policy in place and make sure your staff are instructed in it and are never criticised for adhering to the policy. This last part if critical, because if they do get criticised, then the policy won&#8217;t get enforced and the risk of theft will become greater.</span></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/meath-county-council-scammed/">Could the attempted theft of €4.3m from Meath County Council happen to your business?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Internet Security Awareness and Safety Training</title>
		<link>https://www.l2cybersecurity.com/security-awareness-training/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Sat, 02 Apr 2016 08:00:53 +0000</pubDate>
				<category><![CDATA[Services]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[CEO Fraud]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spear-Phishing]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=523</guid>

					<description><![CDATA[<p>Justification: Did you know that malicious software gets past commercial, enterprise grade anti-virus and e-mail filtering products on a worryingly regular basis? Firewalls and Anti-virus packages lure people into a false sense of security. While they do provide protection up to a point, if somebody opens an e-mail attachment that contains new malicious software, these&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/security-awareness-training/">Internet Security Awareness and Safety Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="wp-image-525 aligncenter" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/We-have-Dave-1-300x209.jpg" alt="Security Awareness Training" width="567" height="395" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/We-have-Dave-1-300x209.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/We-have-Dave-1.jpg 600w" sizes="(max-width: 567px) 100vw, 567px" /></p>
<p><strong>Justification: </strong></p>
<p>Did you know that malicious software gets past commercial, enterprise grade anti-virus and e-mail filtering products on a worryingly regular basis?</p>
<p>Firewalls and Anti-virus packages lure people into a false sense of security. While they do provide protection up to a point, if somebody opens an e-mail attachment that contains new malicious software, these protections are effectively useless.<span id="more-523"></span></p>
<p>Cyber incidents, most notably Ransomware attacks have seen massive increases recently. 93% of contaminated e-mails in Quarter 1 2016 have carried a Ransomware payload (source &#8211; PhishMe Q1 2016 Malware review). 30% of people that receive evil e-mails open them and 12% of those that do, then open attachments or click on links (source &#8211; Verizon 2016 Data Breach Investigations Report).</p>
<p>These statistics highlight the fact that a significant weak link in any organisation, where it comes to using the internet and e-mail, are THE STAFF, but it&#8217;s not their fault as they may not have the necessary awareness of the risks.</p>
<p>The best protection to cover this gap are staff that are aware of what the threats are and how they manifest themselves. Once they are armed with the knowledge of what to look out for and how to protect themselves, they will be much less likely to cause a security breach.</p>
<p>The training which L2 Cyber Security Solutions provide is probably the most comprehensive on offer in the country. Other providers only focus on protecting e-mail usage, whereas we make the learner aware of other threats such as Malvertising, Social Engineering and WiFi Eavesdropping. We also have a well-received section on how to create unique and strong passwords, as well as covering mobile device best practices all in one course.</p>
<p>&nbsp;</p>
<p><strong>Programme Aims: </strong></p>
<p>The purpose of this programme is to equip the learner with the knowledge and skill to identify threats on the internet, thus raising their awareness and to take steps to protect themselves from these threats.</p>
<p>&nbsp;</p>
<p><strong>Programme Objectives: </strong></p>
<ol>
<li>Learn what threats there are.</li>
<li>Spot Social Engineering in action.</li>
<li>Identify malicious e-mail.</li>
<li>Acquire safe web browsing practices.</li>
<li>Learn good computer &amp; mobile device practices.</li>
<li>Create strong and unique passwords.</li>
<li>Learn the <a href="http://www.l2cybersecurity.com/the-ten-commandments/">10 Commandments</a> of good Cyber Security.</li>
</ol>
<p>&nbsp;</p>
<p><strong>Programme Delivery: </strong></p>
<p>An interactive workshop, with individual and group participation in discussing Cyber Security.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><strong>Audience: </strong></p>
<p>People who have access to and utilise the internet and e-mail, whether for business or personal purposes, as part of their day-to-day activities.</p>
<p><strong> </strong></p>
<p><strong>Prerequisites: </strong></p>
<p>A basic understanding of Internet browsing and e-mail usage is a prerequisite.</p>
<p>&nbsp;</p>
<p><strong>Materials Provided:</strong></p>
<ol>
<li>A copy of the Security Awareness Training slide deck.</li>
<li>A copy of the exercise on good/bad e-mail.</li>
<li>Handouts with details on:
<ul>
<li>Password tips</li>
<li>Two Factor Authentication tips</li>
<li>The Ten Commandments of Cyber Security</li>
</ul>
</li>
<li>An evaluation sheet.</li>
<li>A follow up e-mail with a softcopy of the “Ten Commandments of Cyber Security”, which has clickable links to the relevant detail for each commandment on the L2 Cyber Security Solutions Blog.</li>
</ol>
<p>&nbsp;</p>
<p><strong>Contact us for more information:</strong></p>
<p style="padding-left: 30px;">Tel:      <span style="text-decoration: underline; color: #0000ff;">087-436-2675</span></p>
<p style="padding-left: 30px;">E-mail: <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/security-awareness-training/">Internet Security Awareness and Safety Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
