1. Recognise common scam tactics
Scammers employ various tactics, and recognising some common ones is the first step of defence against them.
- Deceptive emails: One of the most common methods adopted by scam artists takes the form of deceptive emails. For example, the business could receive an email seemingly from a trusted vendor requesting an urgent payment, with a link to update financial details.
Tip: Look to identify some common red flags in such emails. This could include poorly phrased text, grainy logos, suspicious-looking sender addresses, unsolicited requests for sensitive information or suspicious links. Encourage a cautious approach to email communication, especially regarding financial transactions. In this scenario, questioning the legitimacy of such requests can prevent a potential financial loss.
- Fake invoices: Scammers often send fraudulent invoices, mimicking legitimate suppliers or service providers, to trick businesses into making illegitimate payments.
Tip: Implement a thorough invoice verification process, cross-referencing details with purchase orders, and confirming with known contacts. If you receive an invoice with a slight variation in the supplier's email address, identify the discrepancy and prevent the payment of funds to a fraudulent account.
- Social media account takeovers: Social media platforms are not immune to scams. Scammers may gain control of business profiles, posing significant risks.
Tip: Regularly monitor account activities, enable two-factor authentication (2FA), and educate employees on the risks. If you notice unexpected changes in posting patterns, unusual messages, or unfamiliar access to administrative settings, you can take immediate action to secure the account.
- Phishing attempts: Sometimes scammers create fake websites or emails that mimic legitimate entities to steal sensitive information. For instance, you may receive an email claiming to be from a well-known bank, urging you to log in to address an urgent issue.
Tip: There are some common ways to recognise these attempts, such as checking for subtle misspellings in URLs for fake websites or email addresses for phishing emails. Scrutinise such emails for telltale signs of phishing to avoid falling victim to data breaches.