Phishing emails are a type of scam designed to obtain information or prompt certain behavior from their targets. To that end, they typically appear to come from a person or entity we trust. These scams tend to increase during tax season, but there has also been a spike in phishing scams during the pandemic. According to the FBI, cybercriminals are targeting employees with fake termination phishing emails and video conferencing invitations as a result of COVID-19 downsizing.
In most cases, careful inspection will reveal cracks in the façade, little signs that the message is not what it purports to be. But, of course, most of us don’t thoroughly analyze every email we receive from a colleague or supervisor. When we get an email from our CEO, Lizzy Beth, we don’t hover the mouse over her contact card to verify that the message came from her actual company email and not “[email protected]” We see the email, assume Lizzy Beth wants us to send her the requested information, and send it.
A successful scam can be a costly data breach with legal consequences. Businesses are generally required to take reasonable precautions to protect personal information in their possession. In the event of a breach, many states require that notice be given to those whose information was compromised. This notice might need to include the cause and nature of the data breach as well as what protections are afforded to those affected.
One of the best ways to protect your company from these sorts of scams is to have a policy and practice of never emailing sensitive employee information. The language below may serve as an effective reminder:
“Employees should not under any circumstance email sensitive employee information such as W-2s, benefit enrollment forms, completed census forms, or anything with social security or credit card numbers. Email is inherently insecure, and scammers may pose as company executives or employees to steal information. If you receive a request to email any such sensitive information, do not respond to it. Instead, inform your manager immediately.”
You can help protect your organization by giving employees examples of the kinds of emails and other communications (texts, calls, etc.) that are likely suspicious. Here are a few:
- A notice from your email provider suggesting you change your password.
- A message from the IRS asking you to click a link, open an attachment, or provide information.
- A message asking you to click a link to pay fines or penalties.
- A request for W-2s or payroll records.
- A request for names, birth dates, home addresses, salaries, and social security numbers.
- A request for contact information.
- A request to purchase gift cards and email the sender the card numbers.
- A request for login information.
- A communication with glaring typos.
- A communication that says “EMERGENCY” in the subject.
- A LinkedIn connection from someone you don’t recognize even though they purport to work at your company and have connected with some of your colleagues.
GTM clients have peace of mind that their payroll accounts and company data are secure. We voluntarily undergo a rigorous examination and assessment process for SOC 1 compliance, and our staff receives regular security training on preventing data breaches. Request a free quote to learn more about why switching to GTM is the right move.