Fraud in the Midst of COVID-19

Fraud in the Midst of COVID-19

With the growing Coronavirus impact on our society, scams are also growing exponentially. Below is a summary of several of the most common scams, and resources to help you stay ahead of this fraud in the midst of COVID-19.

Staying Vigilant Against Fraud in the Midst of COVID-19
In the midst of the COVID-19 pandemic, frauds and scams are emerging. Americans need to be aware that there are individuals attempting to profiteer from this emergency through online phishing scams, door-to-door COVID-19 testing offers, falsely promising free care, etc.
Report Suspected COVID-19 Fraud to National Center for Disaster Fraud Hotline:
(866) 720-5721 or email disaster@leo.gov

Here is what to look for

Below is a list of 5 scams designed to defraud you in the midst of the COVID-19 pandemic.

  1. Phishing Scams
    We are all looking to keep up with all that is happening with the Coronavirus.  Our eagerness and fear may be making us more vulnerable to fake coronavirus update emails,  and texts. Think before you click on links, ask yourself if it makes sense.  You may be one click away from being infected by malware and adding more stress to your life.  Do not give out any personal information over the phone!
  2. Fake Government Representations
    The bad guys are pretending to be government representatives. Don’t respond to texts and emails about checks from the government. The details are still being worked out. Anyone who tells you they can get you the money now is a scammer.

    1. Here is an example of a fake Government Representation:
      As the U.S. government considers a financial relief package for citizens, false claims of the government sending a $1000 relief check to individuals are already in the works by scammers who seem to be a step ahead of any official decision. Fraudsters are posing as the government to collect your personal information such as Social Security numbers or bank account numbers to send out your “coronavirus financial aid” deposit.
  3. Update and Donation Sites
    Websites designed to collect your Personal Identifiable Information (PII) are being published.

    1. Some examples we have seen:
      1. Coronavirus updates
      2. Emergency Response Plan Sites
      3. Donation Sites
      4. Others include the “sale” of things like facemasks, sanitizer, test kits etc.
  4. NO CURE…
    The FTC and FDA have jointly issued warning letters to seven sellers of unapproved and misbranded products, claiming they can treat or prevent the Coronavirus. The companies’ products include teas, essential oils, and colloidal silver.The FTC says the companies have no evidence to back up their claims — as required by law. The FDA says there are no approved vaccines, drugs or investigational products currently available to treat or prevent the virus. Read more about the warning letters.
  5. Fake Jobs
    This has affected all of us in one way or another.  Unfortunately, some have lost their jobs and are looking for a solution.  The dirtbags know this and are creating fake job postings to entice some of us to participate in a scam or to provide PII.  Make sure you know what you are applying for and do your research before you provide any information.

We are all dealing with this in our own ways but we need to be careful.  Careful with each other but also with potential fraud in the midst of COVID-19.

If you think you have been a victim, please do not hesitate to reach out to us here at defend-id.  Or if you spot a fraud please report it:

Report Suspected COVID-19 Fraud to National Center for Disaster Fraud Hotline:
(866) 720-5721 or email disaster@leo.gov

 

Please stay healthy.

4 SMB Cybersecurity Tips from the FBI

4 SMB Cybersecurity Tips from the FBI

John Iannarelli

John Iannarelli, former FBI Special Agent offers 4 SMB Cybersecurity tips.  Is your business safe from the cybersecurity threat? 

According to the Allianz Risk Barometer for 2020, cyber incidents ranked as the number one business risk in its ninth annual survey of risk experts.

Based on the above, I just interviewed former FBI Special Agent John Iannarelli (http://fbijohn.com/) in between his national television appearances on Fox News and Fox Business.

Mr. Iannarelli retired from the FBI after more than 20 years of service, during which time he was the FBI’s National Spokesperson, on the FBI Cyber Division executive staff, an FBI SWAT team member, and the Assistant Special Agent in Charge of the FBI’s Phoenix Division, where he oversaw all Criminal, Cyber, and Counter Intelligence investigations throughout Arizona.

Since leaving the FBI, Mr. Iannarelli is an active contributor for national news outlets, keynote speaker, author, and security consultant.

I asked Mr. Iannarelli for simple advice on how to keep small businesses safer in 2020.  Here are his 4 cybersecurity tips for small businesses and sole proprietors:

Ransomware

Maintaining a strong firewall, keeping your security software up to date, and the patching of vulnerable software is critical”, said Iannarelli. He also said, “The restoration of your computer files from a backup is the fastest way to safely regain access to your data.”  Mr. Iannarelli recommends “to not pay the ransom as there is no guarantee that you will be able to regain access to your files and that once you pay the cybercriminals they are likely to attack again.” 

Free Public Wi-Fi  (Public Wifi is Putting You at Risk)

Hackers steal consumer data from devices connected to unsecured networks by positioning themselves between you and the connection point. This means that instead of talking directly with the hotspot, you end up sending your data to the hacker. Mr. Iannarelli recommends “use of VPN encryption to help prevent cybercriminals from hacking into your WiFi connection and intercepting the data you send and receive.” 

Vendor Due Diligence

According to the Ponemon Institute, third-party breaches remain a dominant security challenge for small and large businesses.  Over 63% of data breaches are linked to a third party. He said, “Small businesses should establish information security and governance best practices including a data breach and incident response policy and plan.”.   A plan will protect your business, help win new business, and elevate your due diligence profile.

State and Federal Notification Laws

Since the United States does not have a Federal Privacy law.   Mr. Iannarelli stated“understanding current state privacy laws where your small business conducts business is critical to responding to a data breach event in a timely and effective manner.” 

If you have been victimized by an online scam or any other cyber fraud, be sure to report it to the FBI’s Internet Crime Complaint Center at www.IC3.gov or call your local FBI office.

By Mark Pribish
Vice President and ID Theft Practice Leader

MAKE A STRONGER CYBERSECURITY COMMITMENT IN 2020

MAKE A STRONGER CYBERSECURITY COMMITMENT IN 2020

Every consumer and small business owner needs to make a stronger cybersecurity commitment in 2020 to safeguard personal and business information.

To help with your cybersecurity commitment, we are highlighting three important topics:

Glossery, Cyber SMB, ID Theft

  1. Identity theft terms,
  2. consumer need-to-knows,
  3. and small business best practices.
First, Consumer Affairs has an identity theft glossary that serves as a great reminder to the current threat environment including:
  • Keylogger: A keylogger is a computer program that records a person’s keystrokes to obtain confidential data.
  • Phishing: Phishing is a popular type of internet scam in which fraudsters send emails claiming to be from a reputable company to trick individuals into revealing personal information.
  • Smishing: Similar to phishing, smishing (or SMS phishing) is when someone attempts to mine sensitive information under a fake identity through text messages.
  • Vishing: Like phishing or smishing, vishing is when an identity thief attempts to gain sensitive information over the phone.
Second, consumers need-to-know how to protect themselves from becoming a victim of ID theft:
Third, small business needs to implement cybersecurity best practices to help mitigate their exposure from identity theft and data breach events:
  • Annual employee education should be the No. 1 priority. Education is key, the threat level is rising and you don’t want it to sink your business because your employees are not educated.
  • Your small business needs to create, test and update a written information security and governance policy annually, including penetration testing and a simulated data-breach event.
  • Consider adding cyber liability insurance to help respond to evolving state and federal breach notification laws since most small businesses lack the financial and human resources to respond to a data breach.

Unfortunately, as we learn and get better, so do the criminals.  It is our responsibility to stay educated and protect ourselves and employees.  Ring in 2020 with a stronger cybersecurity commitment to help reduce your cybersecurity risks.

By Mark Pribish
Vice President and ID Theft Practice Leader

Learn more about breaches as small businesses here:  43% of Breaches Affect Small Businesses

43% of Breaches Affect Small Businesses

43% of Breaches Affect Small Businesses

In the recently released 2019 Verizon Data Breach Investigations Report (DBIR), Verizon found that 43% of breaches affect small businesses and that a third (32%) of breaches involved phishing, a form of social engineering.

Verizon built this report upon the analysis of 41,686 security incidents and 2,013 confirmed data breaches, the Verizon DBIR digs into the overall threat landscape, the actors, actions, and assets that are present in breaches.

The 2019 Verizon Data Breach Investigations Report (DBIR) Key Takeaways (please see here) highlights 12 key takeaways including:

 

  1. Financial gain remains the most common motivate behind data breaches (71%)
  2. 43% of breaches affect small businesses
  3. Phishing Phunny!A third (32%) of breaches involved phishing
  4. The nation-state threat is increasing, with 23% of breaches by nation-state actors
  5. More than half (56%) of data breaches took months or longer to discover
  6. Ransomware remains a major threat and is the second most common type of malware reported
  7. Criminals increasingly target Business Executives with social engineering attacks.
  8. Crypto-mining malware accounts for less than 5% of data breaches, despite the publicity it didn’t make the top ten malware listed in the report
  9. Espionage is a key motivation behind a quarter of data breaches
  10. 60 million records breached due to misconfigured cloud service buckets
  11. Continued reduction in payment card point of sale breaches
  12. The hacktivist threat remains low, the increase in the DBIR 2012 report appears to be a one-off spike

An interesting takeaway:

Cyber attackers target the network, where executives are “six times more likely to be a target of social engineering than they were only a year ago; and, C-level executives are 12 times more likely to be the target.”

This means that Business Email Compromises (BEC) are proving successful for ID theft criminals and cyber thieves.

Verizon stated that BEC breaches represented 248 (18%) confirmed breaches out of the 2,013 confirmed data breaches. In addition, Risk-Based Security recently announced the release of its Q1 2019 Data Breach QuickView Report highlighting how over 1,900 data breach events — exposing over 1.9 billion records — were reported in the first three months on 2019.

According to Risk Based Security, “no other first quarter has seen this level of activity, putting 2019 on pace to be yet another ‘worst year on record’ for the number of publicly reported breaches.”

The report found “that 67.6% of records compromised in Q1 were due to exposure of sensitive data on the Internet.”

If you are a small business, considering Identity Theft Protection as an Employee Benefit or a breach readiness and response program is worth considering!

error

Enjoy this blog? Please spread the word :)