You have a parcel waiting for you, by Ric McCready, Scottronic Technologies
The text contains a link and if you click on the link two things happen. Firstly, all your contacts and any credentials the malware can find gets sent off to the scammers. Then an app is installed which starts sending more text messages off to all your contacts – and so the cycle goes on. Scams, ransomware, and malware like this have been around for some time. Most people are aware they exist, but a surprising number of people still get caught out. What makes this sort of scam interesting from a business security perspective is that many mobile phones are personal devices but are used for business too. These devices will have business data and business credentials stored on them however they are often not subject to the business security practices. This is a good example of how difficult it is for businesses to maintain “visibility” of all their data, devices, apps, and credentials. Here are a few suggestions of things a business can do to maintain visibility of their IT footprint:
Keeping visibility of what’s happening in your business IT systems is an important component of overall security. Without visibility it’s very easy to be caught out by those simple scams.
|
|