CPE

Private companies are increasingly impacted by ransomware and hybrid phishing

person typing passcode into their mobile phone

Ransomware and hybrid phishing are a growing concern for businesses. Successful ransomware and phishing attacks can have direct and indirect financial impacts on any organization, including loss of business, operational downtime and reputational damage. According to the “The State of Ransomware 2022” report released by cybersecurity firm Sophos, 66% of survey respondents from mid-size organizations said they had been a victim of ransomware – up from 37% in 2020.

In addition, cybercriminals are increasingly relying on various method of attacks to exploit victims. The “2022 Email Fraud & Identity Deception Trends” study by email security firm Agari found that employees are receiving more and more potentially harmful emails, with 80% of credential theft attempts delivered via a phishing link. Hybrid voice (often called “vishing”) and email phishing attacks are being reported at the highest level ever in history. One common hybrid phishing scam involves including a call-back number in the body of a malicious business email to lure someone into interacting with a fake representative over the phone.

Because ransomware and hybrid phishing attacks are becoming progressively more sophisticated, it’s important to ensure that precious time and resources are best used to deal with ransomware and hybrid phishing threats. No matter your industry or business size, you should be prepared to fight these threats.

How to prevent ransomware and hybrid phishing attacks

Here are six key tips for preventing ransomware and hybrid phishing attacks:

  1. Regularly evaluate cybersecurity defenses to ensure they continue to meet the organization’s needs as they shift over time. Putting these defenses in place is not a one and done. As your organization grows and needs change, your resources may need to adapt.

  2. Proactively anticipate threats and use in-house or outsourced resources to purposefully detect and respond to potential attacks.
  3. Provide focused employee training to help employees learn to identify potential attacks. If your employees know how to spot phishing attempts, your organization may avoid attacks that start at the colleague level.
  4. Perform regular audits to best identify and evaluate threats, including unpatched devices, open ports and other avenues of potential security gaps.
  5. Plan for the worst and hope for the best so that the entire organization knows how to respond when an attack occurs or is suspected to have occurred.
  6. Back up, back up, back up – and then practice recovery and restoration to ensure you can get your systems up and running again as quickly as possible.

Cybersecurity should be at the top of your organization’s priority list. Following these six tips can help you start the process. And whether you’re an IT specialist or in-house CPA, you should be equipped with cybersecurity risk management.

 

Earn 3 CPE credits and learn more about cybersecurity with the Becker CPE course, “Cybersecurity Preparedness for Industry CPAs.”

Share

FacebookLinkedinXEmail
CPE FREE COURSE
Sidebar CTA
Browse our CPE Offerings

About the author

Jennifer F. Louis, CPA, has over 25 years of experience in designing and instructing high quality training programs in a wide variety of technical and “soft skills” topics needed for professional and organization success. In 2003, she founded Emergent Solutions Group, LLC, where she focuses her energy on designing and delivering practical and engaging accounting and auditing training. She was most recently Director of Audit Product Development at Surgent Professional Education, and prior to that served as Executive Vice President/Director of Training Services at AuditWatch, Inc. Jennifer started her career in Audit for Deloitte & Touche LLP. Jennifer graduated summa cum laude from Marymount University with a B.B.A.-Accounting.

Featured

How to take a random sample in Excel
How to take a random sample in Excel
Read More
How to use Excel text functions
How to use Excel text functions
Read More
How to use slicers in Microsoft Excel
How to use slicers in Microsoft Excel
Read More

Now Leaving Becker.com

You are leaving the Becker.com website. Once you click “continue,” you will be brought to a third-party website. Please be aware, the privacy policy may differ on the third-party website. Adtalem Global Education is not responsible for the security, contents and accuracy of any information provided on the third-party website. Note that the website may still be a third-party website even the format is similar to the Becker.com website.

Continue