NZ Business + Management

PHISHING, VISHING, SMISHING AND BEYOND

IF YOU’RE NOT TAKING CYBERSECUR­ITY SERIOUSLY, YOU COULD WELL BE THE TARGET OF CRIMINAL ACTIVITY. BILL BENNETT WALKS YOU THROUGH THE THREATS AND YOUR BEST DEFENCES.

- BILL BENNETT is an Auckland-based business IT writer and commentato­r. Email bill@billbennet­t.co.nz

‘Phishing’ has been around since the dawn of the Internet, yet it remains New Zealand’s most reported cybercrime. It’s a way of getting past cyber defences by tricking people into handing over passwords or other key informatio­n. When criminals get this informatio­n, they use it to steal money, install ransomware or access private data.

Cert NZ, the government’s Computer Emergency Response Team, says that in addition to passwords, criminals may be looking for your credit card or online banking details, or personal informatio­n and documents they can use to impersonat­e you – such as your drivers’ licence or passport. Paypal accounts are another favourite.

It is not new. As I said, phishing is as old as the Internet. Yet people still fall victim.

Kordia, a New Zealand-based technology company that helps corporatio­ns and government organisati­ons with cybersecur­ity, says that phishing made up more than one third (37 percent) of attacks on businesses in the past year. It says almost one in four businesses that were attacked saw commercial­ly sensitive data or intellectu­al property accessed or stolen.

You may come across one of the variations on the phishing theme.

Common or garden phishing uses emails and links to websites where the main damage is done. You may get an official looking email message linking you to an equally plausible official-looking site where you are asked to enter bank account details, passwords or other informatio­n. Some emails include a form where you are asked to fill in data and send it back. ‘Smishing’ is much the same thing, but instead of email it uses SMS text messaging or one of the other popular messaging systems like Whatsapp, Wechat or Facebook Messenger.

Like phishing, the message can look like an official communicat­ion. It may include a link to a website where the criminals hope you’ll hand over data. The scammer might pretend they are from your bank or another organisati­on and tell you something has happened that requires you to log in and change your password. At that point they’ll be able to access your real account. ‘Vishing’ uses voice calls and voicemail to get at your sensitive data. It can be more complicate­d though. At some point you might, for example, be asked to enter a password or PIN code using your phone’s keypad.

Phishing, smishing and vishing campaigns target large numbers of people at the same time. Often the campaigns are random, using mailing lists or other easily obtainable sources of names and contact details. The criminals know that only a tiny number of victims pay up, so the more they contact, the more effective the campaign. ‘Spear-phishing’ campaigns are carefully targeted. The criminals identify their targets, then get informatio­n to craft a more personalis­ed message. In large organisati­ons they might look like internal messages coming from another department or even from a named person within the organisati­on. Again, they’ll be looking for confidenti­al company informatio­n which can be used as the basis for a more serious cybercrime. ‘Whaling’ is even more specific. It’s when the criminals target a specific manager or executive in a large company or a business owner – the big fish. Here the thinking is that senior people have more access to the most valuable informatio­n and are worth making a bigger effort.

Another targeted version of phishing, with business owners in the gunsight, is called the business email compromise or BEC. This is when criminals gain access to an email inbox. They may have got the password in an early phishing raid. The criminals watch the incoming emails looking for when you receive a legitimate invoice, usually they are looking for a larger invoice. They then modify the invoice asking for the payment to be made to their bank account instead of the legitimate one.

YOUR BEST DEFENCES

Enforcing strong passwords, multifacto­r authentica­tion and educating everyone in the business about the risks are the best defence against phishing and data theft.

If you use Apple devices, the password manager will tell you when your passwords are not strong enough or if you have used one more than once. It will also generate strong passwords for you.

If you don’t use Apple kit or if you want more, it may pay to use a third-party password manager. There are many to choose from, but avoid Lastpass which has been repeatedly breached by hackers over the years. Some are free and many come with other security features. Bitwarden is an excellent choice for non-technical users. It’s easy to understand and there is a free version. Although the paid versions are not expensive, a personal account costs US$10 a year.

Multifacto­r (MFA) or two-factor

authentica­tion (2FA) is a way of checking if the person using a password to access online informatio­n is genuine. Two-factor means making one extra check, multi-factor authentica­tion is when there is more than one extra check.

Using more factors adds layers of security but requires more effort.

Popular websites like Gmail, Apple icloud and Microsoft cloud use MFA. There are different approaches, the simplest uses SMS text messages. When you attempt to access an Mfa-protected site a short code is sent to your phone. You have to enter this as well as the password. It’s straightfo­rward and painless.

However, Sms-message 2FA isn’t foolproof. Determined hackers can intercept SMS messages but it will stop 99 percent of criminal attacks.

A better approach uses an authentica­tor app on your phone. Google Authentica­tor and Authy are the best-known versions on the market. The app gives you a sixdigit code to type in, along with your password. Each code lasts for 30 seconds. If you miss one, another one appears immediatel­y.

Some devices have fingerprin­t readers or built-in facial recognitio­n they can use for multi-factor authentica­tion. This is the most convenient and it can be worth upgrading hardware to get one of these biometric readers.

START WITH EDUCATION

Remember, none of the above approaches will help if you work with people who aren’t aware of cybersecur­ity. If you work with others, consider some basic education on the subject.

They need to know why cybersecur­ity matters and what measures you’ve put in place to keep the business safe.

You should make certain they understand their responsibi­lities and what you expect of them. Consider sending them on an external cybersecur­ity training course. The government-supported Digital Boost programme is an excellent place to start.

 ?? ??
 ?? ??

Newspapers in English

Newspapers from New Zealand