Kaspersky helps to fight cybercriminals target Small and Medium Biz

 

KUALA LUMPUR — The first three months of 2020 proved to be busy for cybercriminals targeting small and medium businesses (SMBs) in Southeast Asia (SEA).

The global cybersecurity company’s Anti-Phishing System prevented 834,993 phishing attempts against companies with 50-250 employees.

It is a 56% increase compared with the same period last year withjust over 500kfraudulent attempts blocked.

The rating of organisations targeted by phishing attacks is based on the triggering of the heuristic component in the Anti-Phishing system on user computers.

This component detects all instances when the user tries to follow a link in an e-mail or on the Internet to a phishing page in cases when such link has yet to be added to Kaspersky’s databases.

The statistics mentioned are analysed from Kaspersky’s solutions for SMBs operating with Windows, Mac OS, and Linux.

“The financial toll combined with the urgent need to adapt to a forced remote working arrangement without enough preparation undoubtedly put the IT security of SMBs on the edge.

“At the same time,cybercriminals are unethically piggybacking on the current chaos to increase their attacks’ success rate through social engineering tactics like phishing.

“Our data revealed such attempts are increasing as our technology foiled more phishing attempts this year than in 2019,” says Yeo Siang Tiong, General Manager for Southeast Asia at Kaspersky.

Phishing is one of the most flexible types of social engineering attack.

Social engineering attacks, or tricking themind, exploit human emotions to victimise users online.

Cybercriminals are also incorporating topics and “hot phrases” related to COVID-19 into their content, boosting the chances of their infected links or malicious attachments getting opened.

The damage of this online crime ranges from hacked companies’ networks to stolen confidential data like personally identifiable information (PII), financial credentials, and even corporate secrets.

Aside from this, it is known that phishing attacks, particularly those with malicious link or attachment, are popularly used aslaunch pads for targeted attacks on organisations, such as the case of the $81M Bangladesh Bank Heist.

 

“Small and medium enterprises form the backbone of SEA’s growing economy, contributing immensely on both gross domestic product and employment. It is clear that governments across the region are aware of this as each has formulated different ways to help the sector during this challenging period.

“For our part, we are currentlyoffering our select solutions for free to help SMBs and even the healthcare industry fend off escalating cyberattacks against them,” adds Yeo.

Especially created with the SMBs’ security needs in mind, Kaspersky is giving six months free licenses for Kaspersky Security for MicrosoftOffice 365.

Designed to protect mailboxes from viruses, Trojans, spam, phishing and other types of malware that can be spread via email, this solution also protects cloud-oriented enterprise communication and collaboration apps such as Microsoft Exchange Online, OneDrive, SharePoint Online and Teams from known and unknown cyberthreats.

Find out more about this promo via this link.

Aside from these, Kaspersky experts suggest the following tips for SMBs to avoid being lured by cybercriminals through phishing:

  • Teach employees about the basics of cybersecurity. For example, not opening or storing files from unknown emails or websites as they could be harmful to the whole company, or to not use any personal details in their passwords. In order to ensure passwords are strong, staff shouldn’t use their name, birthday, street address and other personal information.
  • Regularly remind staff of how to deal with sensitive data, for example, to only store it in trusted cloud services that need to be authenticated for access and that it should not be shared with untrusted third parties.
  • Enforce the use of legitimate software, downloaded from official sources.
  • Make backups of essential data and regularly update IT equipment and applications to avoid unpatched vulnerabilities that could cause a breach.