Protect your business: 7 common scams and solutions

Risk management

As cybercriminals become more confident and daring, business leaders need to buckle down and adopt defenses. 

Fighting fraud is a never-ending battle, especially during times of uncertainty. So business leaders need to keep cybersecurity best practices top of mind. To help safeguard your business and protect your employees online, here are some of the most common scams and tips for preventing them.

Email fraud

Email scams are becoming increasingly common—94% of malware starts in the inbox.Disclosure 1 Remember to watch out for emails impersonating executives and management. And make verifying requests for wires and transfers part of your standard practice. 

Component ID : "accordionGridLayout-53346668"
Model : "disclaimer"
Position : "left"

[music begins]

[voiceover] Companies experience email fraud when individuals click on a malicious link or provide personal information. The most common email scams appear to come from senior officers at your organization or from existing vendors. They can be difficult to differentiate from legitimate emails, especially as fraudsters become more sophisticated. Stay vigilant. If you see something suspicious, call the person who sent you the email and verify their request.

[music ends]

Phishing

In times of crisis—including economic downturns or political uncertainty—phishers step in to exploit the situation. These instances inspire cyberattackers to pose as reputable organizations or government agencies and send fake emergency-related messages. Phishers ultimately aim to steal email credentials, other private information, or funds. If an email looks even mildly suspicious, err on the side of caution and don't open it.

Component ID : "accordionGridLayout-1037320966"
Model : "disclaimer"
Position : "left"

[music begins] 

[voiceover] Phishing is when hackers and fraudsters pretend to be legitimate businesses in order to steal your personal information or sign-in credentials. It’s a common tactic, because tricking people into revealing information is usually easier than breaking througha device’s defense systems. Beware of unsolicited requests for personal information from senders you don’t recognize, and don’t click on links in emails or text messages that look suspicious.

[music ends]

Social engineering

Social engineering—a strategy that relies on psychological manipulation—can take the form of deception on social media, a text message, or a targeted phishing attack. Protect your company by encouraging the use of multifactor authentication and ensuring your IT systems are equipped with the most up-to-date safeguards.

Component ID : "accordionGridLayout-244435084"
Model : "disclaimer"
Position : "left"

[music begins]

[voiceover] Social engineering—or psychological manipulation—is the basis for nearly every attempted cyberattack. Cybercriminals can try to trick you into providing private information by offering fraudulent promotions or IT help over the phone or email. Verify any source that requests information from you, and never give out personal, financial, or company details unless you’re already familiar with the person on the receiving end.

[music ends]

Password theft

You and your team may be relying more on video chat and other password-protected forms of communication as remote work increases. More passwords mean more opportunities for password compromise. Consider urging employees to update passwords frequently, whether they work from home or not, and use unique passwords on different platforms to reduce risk.

Component ID : "accordionGridLayout-1758255102"
Model : "disclaimer"
Position : "left"

[music begins] 

[voiceover] Password theft happens when hackers get username and password combinations from less secure sites, then use these passwords to make purchases, move money, or steal data. Strong password security defenses keep your employees and company safe. Promote best practices by requiring teammates to create secure, unique usernames and passwords for every online account they use. 

[music ends]

Card skimming

The U.S. is the most credit card fraud-prone country in the world.Disclosure 2 That means e-commerce websites are susceptible to hackers who can attack with malicious code designed to capture credit card information. Make sure you are using an encrypted form or secure website to enter any financial details. Better still: When possible, use a third-party payment system, which provides an additional layer of security.

Component ID : "accordionGridLayout-57018052"
Model : "disclaimer"
Position : "left"

[music begins] 

[voiceover] Card skimming happens when a thief places a hard-to-detect device over a card scanner somewhere like an ATM or gas pump. As you swipe, the device intercepts and stores your information for the thief to take advantage of later. Whenever you use a card reader, watch for misalignments in the card-reading slot, or partially covered stickers or text. And play it safe—if anything seems out of place, try to use a different machine.

[music ends]

Automated clearing house (ACH) fraud

A new ACH Rules for Corporates Resource Center can now help you stay informed on ACH-related news that may impact your business. Overall, ACH fraud can be avoided by overcommunicating with vendors and other partners, relying on ACH fraud control options, and using a Universal Payment Identification Code. Ask your employees to be similarly vigilant.

Component ID : "accordionGridLayout-300272249"
Model : "disclaimer"
Position : "left"

[music begins]

[voiceover] ACH fraud is one of the fastest-growing types of deception techniques, especially as criminals create more sophisticated scams and use the latest technology to their advantage. A common trick is to infiltrate a vendor’s contact information and respond to apreviously sent message, so it appears to be part of the same chain or thread. Some even use details from social media to make the email, text, or online message seem like it's coming from a trusted contact.One of the best ways to prevent fraudulent transactions is to have close relationships with vendors.Check in with them to verify any unusual or first-time requests, changes in contact information or remittance addresses, or changes in wiring or ACH instructions. Whenever possible, confirm any change with two sources.Monitoring incoming ACH payments is just as critical. Truist offers fraud prevention services that allow you to block or review ACH debit transactions before they deposit to your account. We also offer a Universal Payment Identification Code, which gives you masked account numbers for receivables to help prevent unauthorized charges to your account. It can be good to remind everyone within your organization that time spent reviewing ACH transactions upfront can reduce time spent rectifying problems later. 

[music ends]

Card not present

With more business being handled over the phone than in person, the risk of card-not-present fraud is more prevalent than before. In addition to ensuring all card information remains secure, businesses should be wary of accepting stolen (or fake) credit card payment information over the phone. To avoid this type of scam, don't deliver goods to anyone without verifying their identity, and request payment for larger orders by bank transfer.

Component ID : "accordionGridLayout-234306529"
Model : "disclaimer"
Position : "left"

[music begins] 

[voiceover] Fraudsters no longer need to steal a physical debit or credit card to go on a spending spree at your business’s expense. Through sophisticated technology, criminals can now commit fraud by using a card’s information. This is called card-not-present fraud. One of the best defenses against this fraud is a series of simple security checks: always keeping cards in a safe place, not sharing cards or card information among employees, and actively reviewing transaction statements to identify and report suspicious card activity.Don’t forget to double-check the URL of retail websites to make sure you're shopping on the real site—some copycat sites can look very similar. Card information can also be compromised when someone uses an unsecured Wi-Fi network, such as the public connection at a coffee shop or hotel. If public Wi-Fi is your only option, follow best practices by encrypting your session or using a virtual private network.You may want to consider additional account protections, like restricting purchases to those that match a predetermined merchant code or using dynamic card numbers. And when cardholding employees leave the company, close any cards they had access to immediately. 

[music ends]

Protect your business from the threat of fraud

Contact your Truist relationship manager for more information.