CEO fraud

What happens when CEO fraud occurs? And how can companies protect themselves against it? You can find answers in the article.

CEO fraud

Category: mail security

Video

What occurs in the case of CEO fraud?

This is a form of social engineering in which the "human vulnerability" is exploited. In this fraud method, hackers pretend to be the CEO, manager or boss of a company. To appear credible, fraudsters research both the name and email address of the company's CEO and of people who might be authorized to pay. This information is easy to obtain from the company website, PR releases or trade register entries.

Employees are given a pretext to complete transactions such as transferring a sum of money to an account. The e-mails use deadlines or threats of legal action to put pressure on the recipient to act. The scammers often use deceptively realistic e-mails. Since employees may transfer large sums of money without asking just because of the boss's authority, CEO Fraud poses a great risk to companies.

How can companies protect themselves against CEO fraud?

  • Raising employee awareness of the fraud scam

  • Training based on concrete examples

  • Constantly informing about new threats

  • Raising the security awareness of all employees

  • Open corporate culture instead of authoritarian management style.

  • Fraud attempts can be detected and prevented more quickly.

  • In the event of unusual business transactions, it should be possible to make inquiries up to the management level.

In addition to increased vigilance and regular training of employees, clear and transparent rules are the key.

  • Clear procedures and responsibilities

  • Checking of absence regulations

  • Defined control and approval processes

  • Cross-checks in the event of changes to account details

  • Maximum limits for transfers

  • Contacting in case of suspicion

  • Verification of the payment request via callback to the named client

  • Checking e-mails for sender address and correct spelling

  • It is possible that only minor discrepancies exist in the e-mail address, which can expose attackers.

CEO fraud is difficult to prevent technically. Good spam/phishing filters can reduce the risk, but do not provide 100% protection.

  • Simple fraud emails can be detected.

  • Emails are considered suspicious if they are very similar to (but not the same as) the email address used in the company.

In addition to human vulnerabilities, which are often exploited in CEO fraud, there are also technical vulnerabilities that are often the gateways for hackers.

Here, it is important to identify and eliminate potential vulnerabilities in good time. Regular, automated security checks can help here.

Teresa Leonhartsberger

November 30, 2021

Category

Guide

Might be also Interesting

Guide

Asset Discovery Uncovers Shadow IT: A Must-Have for MSPs

In this article, you will learn how shadow IT can become an invisible but significant security risk for companies. Find out how Asset Discovery helps IT service providers to uncover hidden devices and applications on the network. We also present proven measures for controlling shadow IT and improving network security.

November 6, 2024

Guide

Traditional Vulnerability Scanner vs. Security Audit Platform

Find out how lywand's security audit platform differs from traditional vulnerability scanners and which solution is best suited to your MSP business.

October 7, 2024

Guide

IT Security Through System Hardening: What You Need to Know as an MSP

System hardening is an essential process for protecting your customers' IT infrastructure. But what exactly is system hardening and why is it so important?

September 2, 2024