Part of your security posture should involved identity validation when your provider calls your organization. "CDK warns: threat actors are calling customers, posing as support" This social engineering tactic has been used for long, and is very effective in targeted attacks. Don't let your security, governance and compliance effort be ruined by a phone call ! Awareness is key. This is happening for real, and your policies should cover this risk with proper processes. #cybersecurity #governance #compliance #identityandaccessmanagmeent #identity #technology https://lnkd.in/e6kKVech
Upperity, Identity, Signature, dedicated AI and governance, a cloud alternative’s Post
More Relevant Posts
-
CDK's recent cyberattack highlights a critical vulnerability many organizations face: social engineering attempts following a data breach. With its support channels down, CDK customers were prime targets for scammers posing as CDK support. How a strong cyber response plan could have lessened the impact: 1. Pre-incident communication: A pre-written communication plan ensures clear, consistent messaging to customers during a crisis. Proactive warnings about potential scams could have lessened the impact of these calls. 2. Designated spokesperson: A designated spokesperson fosters trust and avoids confusion. Customers would know exactly who to trust for updates, reducing the effectiveness of scammers impersonating CDK staff. 3. Phishing simulations: Regular phishing simulations train employees to recognize and report suspicious emails and calls. This extra layer of awareness would make employees less susceptible to social engineering tactics. #Cybersecurity #Phishing #SocialEngineering
CDK warns: threat actors are calling customers, posing as support
bleepingcomputer.com
To view or add a comment, sign in
-
It's been a busy week in the cybersecurity world. CDK Global had their systems comprised by malicious actors who are now impersonating them and reaching out to customers to gain access to their critical information. This highlights the critical need for robust IT policies and procedures to safeguard your organization. Regular Security Awareness training can empower your team to recognize and avoid such threats, ensuring your business remains secure. #CyberSecurity #ITSecurity #AwarenessTraining #ITPolicies https://lnkd.in/dpg-GubW
CDK warns: threat actors are calling customers, posing as support
bleepingcomputer.com
To view or add a comment, sign in
-
The CDK Global #cyberattack is clearly a sophisticated effort. Attacked a second time attempting to come back online yesterday. Today, these bad actors are calling CDK customers and acting as support to further advance their efforts. This is a critical situation and it's frustrating to see how quickly #dealership employees have taken to social media to make memes and videos about how they don't have anything to do, nothing works, and how #funny that is to them. There's nothing funny about millions of people potentially having their #financial information compromised and making yourself a target to continue the attack. This is quite the situation. https://lnkd.in/gPgp3WuT #cybersecurity #IT #ransomware
CDK warns: threat actors are calling customers, posing as support
bleepingcomputer.com
To view or add a comment, sign in
-
🚨 Attention Auto Dealers: Stay Vigilant Against Phishing Threats! 🚨 In the coming days, weeks, and months, it's crucial to stay alert for phishing and spear-phishing attacks. Here are some key reminders to protect your sensitive information: 🔗 Be Cautious: Avoid clicking on suspicious links or opening unexpected attachments. Always verify the sender's identity before interacting. 📞 Beware of Vishing: Vishing, or "voice phishing," uses phone calls to deceive people into revealing sensitive information. Be wary of unsolicited calls requesting personal or financial details. Stay proactive and protect your dealership from cyber threats. Stay safe and secure! 🛡️ #CyberSecurity #Phishing #Vishing #AutoDealers #CyberThreats #StaySafe #ProtectYourBusiness
CDK warns: threat actors are calling customers, posing as support
bleepingcomputer.com
To view or add a comment, sign in
-
🔒💻 Beware, techies! CDK Global's recent caution to customers against imposters dialing in as CDK reps got me reminiscing about the good ol' tech battles we've had to face. 🤖💥 🚨 With cyberattacks on the rise, the tech industry sure is a warzone these days. 😱 Stay vigilant, my friends! #ainews #automatorsolutions 💬 Let's talk predictions! These sneaky tactics by scammers sure do keep us on our toes. What's next in the cyber saga, eh? 🕵️♂️🔎 #cybersecurity #techindustry 📡 Remember the days when firewalls were our knights in shining armor? Now, it's a whole new ball game out there. ⚔️🛡️ Stay sharp, tech warriors! #throwbacktech #cyberdefense 🔐 Security breaches are like modern-day treasure hunts... well, except we're not keeping what we find! 😆 Keep your systems locked tight, folks! #cyberdefense #lockdown 💭 Share your thoughts: How do you think the cybersecurity landscape will evolve in the next decade? Let's brainstorm! 💡💭 #futuretech #brainstorming Keep your firewalls sturdy, your passwords complex, and your instincts sharp, my fellow tech enthusiasts! Together, we can conquer the cyber chaos! 💪💻 #techcommunity #staysecure #CyberSecurityAINews ----- Original Publish Date: 2024-06-21 04:02
CDK warns: threat actors are calling customers, posing as support
bleepingcomputer.com
To view or add a comment, sign in
-
"Over the past several months, impersonation attempts of transport and freight organizations, whereby a threat actor will create a fake company and trick victims into loading the necessary details to enable them to intercept or disrupt the transaction. These scams, also known as double brokering scams, have been rising rapidly in the last few years, with one freight solution provider having seen a 400% increase in complaints since 2022." This article suggests that technology is only part of the solution. I believe that technology is part of the PROBLEM. As this article mentions, 89% of unwanted messages have “passed” the three most common email authentication checks, getting to your employee's inbox. Your employees have no tools to help them avoid attacks. Your security team has no real-time visibility or control over those attacks. AND IT'S YOUR FAULT. You continue with the same strategy you've been using for 15 years. It's time for change! It's time for PhishCloud Inc. PhishCloud gives your security team the real-time visibility and control they need to see and block #phishing attacks your employees see. And with real-time metrics, you no longer need to rely on simulations and reporting to understand your phishing risk. PhishCloud arms employees with the tools they need to clearly spot and avoid #phishingattacks, across all digital platforms – not just email – letting them Click With Confidence. And PhishCloud delivers reality-based training that imparts real knowledge, not just awareness. Sound too good to be true? Give us 15 minutes to show you the power of PhishCloud Inc. www.phishcloud.com https://lnkd.in/ew_9HkqC
How to protect the global supply chain from phishing scams
weforum.org
To view or add a comment, sign in
-
"Over the past several months, impersonation attempts of transport and freight organizations, whereby a threat actor will create a fake company and trick victims into loading the necessary details to enable them to intercept or disrupt the transaction. These scams, also known as double brokering scams, have been rising rapidly in the last few years, with one freight solution provider having seen a 400% increase in complaints since 2022." This article suggests that technology is only part of the solution. I believe that technology is part of the PROBLEM. As this article mentions, 89% of unwanted messages have “passed” the three most common email authentication checks, getting to your employee's inbox. Your employees have no tools to help them avoid attacks. Your security team has no real-time visibility or control over those attacks. AND IT'S YOUR FAULT. You continue with the same strategy you've been using for 15 years. It's time for change! It's time for PhishCloud Inc. PhishCloud gives your security team the real-time visibility and control they need to see and block #phishing attacks your employees see. And with real-time metrics, you no longer need to rely on simulations and reporting to understand your phishing risk. PhishCloud arms employees with the tools they need to clearly spot and avoid #phishingattacks, across all digital platforms – not just email – letting them Click With Confidence. And PhishCloud delivers reality-based training that imparts real knowledge, not just awareness. Sound too good to be true? Give us 15 minutes to show you the power of PhishCloud Inc. www.phishcloud.com https://lnkd.in/ew_9HkqC
How to protect the global supply chain from phishing scams
weforum.org
To view or add a comment, sign in
-
Buckle Up: BEC and VEC Attacks Target Automotive Industry: Originally published by Abnormal Security.Written by Mick Leach.While every organization across every vertical is at risk of experiencing advanced email attacks, there are certain industries that, for various reasons, periodically become the go-to target for threat actors. Our research revealed that the automotive industry currently finds itself in the crosshairs of cybercriminals launching business email compromise (BEC) and vendor email compromise (VEC) attacks.These attacks, designed to de...
BEC and VEC Attacks Target Automotive Industry | CSA
cloudsecurityalliance.org
To view or add a comment, sign in
-
Ford is investigating claims of a customer data breach after a hacker posted 44,000 records on a forum for less than $3. The leaked info includes names, addresses, and purchase details—fodder for phishing attacks. While Ford initially denied a direct breach, they are now looking into whether a third-party supplier may be involved. This highlights the importance of securing not just your data but also your partners'! Are your vendor relationships cyber-tight? #CyberSecurity #DataBreach #BusinessProtection #StaySafeOnline https://hubs.ly/Q02YVv860
Ford investigates alleged breach following customer data leak
bleepingcomputer.com
To view or add a comment, sign in
-
Your Company Culture Can Become A Powerful Cybersecurity Resource
Your Company Culture Can Become A Powerful Cybersecurity Resource
https://www.cyberdefensemagazine.com
To view or add a comment, sign in
360 followers