(916) 972-9000 info@connectech.us

Your Company is Being Impersonated in a Phishing Scam. What Now?

Phishing is an attempt to obtain private information such as usernames, passwords, security questions, and credit card details for malicious purposes. Phishing attacks happen most frequently via email that looks like it’s been sent from a trusted source. While it’s critical to educate email users about phishing, including how to identify and deflect malicious messages they receive, in many phishing attacks there’s another victim: a legitimate company whose name and identity are being used to send the email.

How should a company or organization respond if their business is impersonated in a phishing scam? Unfortunately, there’s not a single method to shut down phishing attacks, but companies do have a number of ways to fight back.

1. Contact your clients and customers by email or snail mail to let them know that fraudsters are impersonating your business. Tell them to ignore suspicious emails that appear to come from your company, and remind them that your business would never solicit private information, such as passwords or credit card info, via email. If your company has a social media presence, use the platform to share details about the scam. The goal of any phishing attempt is to obtain personal data, so letting your clients know you’ve been targeted by phishers can help ensure fewer people will fall for a scam, which may encourage the phishers to move on.

2. Contact law enforcement.  If you learn of a phishing scam impersonating your business, report it to the FBI’s Internet Crime Complaint Center.

3. Learn how to view an email message’s full header, which will be necessary when reporting or forwarding phishing emails to the organizations listed below. A message’s full header will show where the email originated, and it traces the server path from sender to recipient. If you are a Gmail user, follow these instructions to view the full header. In Apple Mail, follow these instructions. In Outlook, follow these instructions.

4. Forward deceptive messages to the Federal Trade Commission at spam@uce.gov.

5. Report phishing emails impersonating your business to the Anti Phishing Working Group, an industry, law enforcement, and government coalition focused on cybercrime.

6. Report phishing to PhishTank, a collaborative clearinghouse for data and information about phishing on the Internet.

7. If you’re a Gmail user, learn how to mark email as spam and report phishing to Google, and be sure to do it every time you receive suspicious email.

8. If the phishing sender is using a Gmail address, report the Gmail abuse to Google. If you receive what appears to be a phishing email from Apple, forward it to reportphishing@apple.com. To forward phishing scam messages to Microsoft, email phish@office365.microsoft.com.

9. Consumers can file a complaint with the FTC. (This complaint process is just for individuals, not businesses, so you’ll need to ask your clients for assistance.) If your complaint is against a company outside the United States, file it at econsumer.gov.

10. If you believe you’ve found a phishing site on the web, report the phishing page.

11. Use the phishing episode as reminder to update your company’s security practices. This is an ideal time to review and update your security policies and procedures, including changing passwords and implementing two-step authentication for devices. Contact your internal IT support team, or Connectech, to learn how to authenticate your company’s Internet domain, which will ensure that legitimate email sent by your company isn’t flagged as spam on the recipient’s side. And provide training to all employees and volunteers about phishing scams and how to identify them, so they are less likely to become victims.

12. G Suite users, your account’s Super Admin can configure additional protections for Gmail. From the Admin Console, go to Apps > G Suite > Gmail > Safety for additional protection options. You can learn more about these options here. Although all editions of G Suite offer access to these settings, only G Suite Enterprise edition allows admins to review affected emails and insight data. Connectech also has the ability to configure these settings on your behalf; please contact us if we can assist you.

For assistance in evaluating or implementing security solutions on your personal or business devices, please call us at (916) 972-9000, email info@www.connectech.us, or complete the form below.

10 + 1 =