The recent hack on the U.S. Office Of Personnel Management (OPM), which was one of the most serious government cyber attacks of all time, teaches us all some lessons that the mortgage industry should take to heart.
Since the mortgage industry deals with the same kind of sensitive financial information that the OPM had in its database, we can glean some insight from the security breach. While OPM employees will possibly be affected for a long time to come, people just starting out in life may have a mortgage for the next ten, twenty, or thirty years. That's a large part of a person's life, and it can seem a lot longer if that person's Personally Identifying Information (PII) has been compromised.
One of the popular ways that attackers compromise computer systems is through spear phishing. Spear phishing is sending an attachment or a link via email to the employee of a target company in the hope that the employee will open the attachment or click the offered link, thereby introducing a virus or backdoor into the company's computer systems.
Sometimes the approaches are so amateur that the attempts are a bit funny. But the attackers are becoming ever more sophisticated, and not all of the attacks are easy to spot. Many attackers start with publicly available information to craft their phishing emails. This publicly available information may include the names of corporate officers. Suppose you receive an email with the CEO's name as the sender. These are a bit trickier to identify as a suspicious emails than the obvious Nigerian 401 scams.
As spear-fishing emails become more sophisticated, you want to be able to safeguard yourself and your sensitive information. Here are five ways to avoid becoming the victim of a malicious email attachment:
As hackers get more sophisticated, so does virus scanning software. Updated virus software is important, but the most effective way to block suspicious email attachments remains an informed user doing the right thing and using a trusted WaaS. Being an informed user means both knowing what best practice is, what to look for, and how to react when you see it. For more information on security best practices, please contact us.