91快活林

How to defend your company with payment fraud protection

Category:Payments Automation, Risk management
Updated:2022-05-10
Author:Tony Carothers
CyberSecurity.jpg

The remote work era brought on by the COVID-19 pandemic has made it even easier for criminals to execute payment fraud attacks. For most companies, it's become a matter of when they鈥檒l face a fraud attack--not if.

New defenses are needed, because the nature of cybercrime is changing. For many years, bad actors focused on software-based attacks such as ransomware. Vendors hadn't quite caught up to developing code secure enough to operate in the hostile environment that we know is the internet today.听

Now vendors have hardened their systems to the point where it's inefficient for a bad actor to carry out an attack using technology alone. In the last year or two, we've seen a shift to schemes that use technology but ultimately rely on strategies that exploit human weakness. This is the new frontier in the battle against payment fraud.

Sophisticated attacks

Any effective security effort relies on technology, process and people. Technical security efforts such as securing hardware, software and laptops is still important. The ability to gain unfettered access at the hardware or software level allows a bad actor to do literally anything. Organizations need to double down on educating and training people throughout the organization to recognize, report and respond to suspicious activity.

The problem is that many organizations are still focusing on technology as the main line of defense. Criminals are capitalizing on the fact that they aren鈥檛 addressing the whole picture. Add the chaos and confusion of the pandemic, and over the past 24 months we鈥檝e begun to see some pretty sophisticated cyberattacks emerge.听

We saw a lot of phishing around work from home, and again around returning to the office. There was so much uncertainty, and people were so hungry for information, they鈥檇 click on anything that appeared to offer it. The bad actors were quick to capitalize, and they鈥檝e been very nimble in customizing their attacks.听

Here鈥檚 a great example: For a long time, Microsoft was the most commonly spoofed email used in phishing attacks. A typical attack might be a fake email from a bad actor saying you needed to update your password, or act now because you're running out of mailbox or drive space. Now, DHL Delivery Service has surpassed Microsoft as the most commonly spoofed email because deliveries have become much more prominent in our personal and professional lives.听

Deep reconnaissance

Bad actors have also become very good at business email compromise (BEC), a key method of payment fraud. BECs are often very well designed and thought out. The bad actor will research an organization, their vendors, and their processes. It's actually a very deep reconnaissance effort.

They use the intelligence they鈥檝e gathered to pose as a vendor sending an email request to change bank account information to one of their own accounts. These emails might be constructed as long threads that contain names and information simulating the documentation of the real process. Sometimes they actually compromise the organization and take control of the email of someone in AP or finance and launch the attack from there. Or, they just spoof it from another mail server.听

In either case, there's no technology that's going to effectively stop that attack. That's why information security today is a counterintelligence function. You have to be aware of information that's out there, and all the ways in which bad actors might use it. And you have to communicate that to the entire organization.

Continuous threat briefings

91快活林 handles this with continuous operational threat briefings. We take real-world attempted attacks that have been detected and blocked, by our organization or other organizations, and dissect them with our entire company. That helps people understand how attacks are happening and what they look like.听

We also work very closely with business leaders to understand their processes and where there might be vulnerabilities. Working together, we can come up with very effective and secure processes.

Beyond 鈥渃astle and moat鈥

IT has historically built what we call a 鈥渃astle and moat鈥, or 鈥渆ggshell鈥, defense. With this defense strategy, there鈥檚 a well-developed, hardened exterior. Enterprises are realizing the shortcomings of that type of architecture in this day and age. Data breaches are still a constant threat, but criminals now rely more on people-centered tactics like weaponizing email. If they can use that to make it past the hard shell, things get kind of squishy.

The most effective way to protect against what's coming is to address the human element. Security is always dynamic because criminals are endlessly creative. They attack, and we defend. They study our defenses and find new ways to attack.听

The ultimate defense is creating an organization-wide security mindset. It's a culture. It's a way of thinking that has to be fostered. It鈥檚 easier to do than you might think.听

You need to develop a programmatic approach, but it鈥檚 not that hard to get people to engage. What we find is that people are very interested in learning because they or someone they know has experienced a cyberattack in their personal lives. It鈥檚 not something that鈥檚 abstract, or exclusively work-related. Unfortunately, it鈥檚 all too relevant.

Tony Carothers.png

Tony Carothers

Tony is the Security Systems Engineer at 91快活林, a FLEETCOR company. He has over thirty years of experience in information security, working in both the public and private sectors.
Payments Automation
Risk management

Discover how making the move to 91快活林 streamlines payments and strengthens your business.

Talk to an Expert

Smarter payments. Stronger growth. Keep business moving.

91快活林 powers payments for 800,000+ businesses worldwide. Let鈥檚 build what鈥檚 next for yours.

By submitting your information through this form, you agree to receive a telephone call or email from a 91快活林 representative. Your information will be used in accordance with our Privacy Policy.