Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Mississippi's Age Guarantee Act Tests Decentralized Social Networks

August 28, 2025

Threads test how to share long format text on the platform

August 28, 2025

Do you hire AI, or are you a human being? Next frontier for Startup Ops in 2025

August 28, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Mississippi's Age Guarantee Act Tests Decentralized Social Networks

    August 28, 2025

    Threads test how to share long format text on the platform

    August 28, 2025

    New AI features in WhatsApp allow you to rearrange and adjust the tone of your message

    August 27, 2025

    Google and Grok are catching up to ChatGpt, says the latest AI report from A16Z

    August 27, 2025

    Google Vids adds AI avatars to the video editor and launches the consumer version

    August 27, 2025
  • Crypto

    Coinbase CEO explains why he fired an engineer who didn't try AI right away

    August 22, 2025

    Your next customer is destroying the 2025 Expo floor

    August 19, 2025

    Crypto Company Gemini File for Winklevoss Twins IPO

    August 16, 2025

    North Korean spies pretending to be remote workers have invaded hundreds of businesses, CloudStrike says

    August 4, 2025

    Telegram's Crypto Wallet will be released in the US

    July 22, 2025
  • Security

    According to Transunion, hackers say they stole the personal information of 4.4 million customers

    August 28, 2025

    The FBI says that China's salt typhoon has hacked at least 200 US companies

    August 27, 2025

    US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

    August 27, 2025

    Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

    August 26, 2025

    Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

    August 26, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Do you hire AI, or are you a human being? Next frontier for Startup Ops in 2025

    August 28, 2025

    From streaming to healthcare to AI, Mark Cuba reveals his “formula of confusion”

    August 27, 2025

    Uncork Capital in a 21-year venture cycle – and what's the difference between this?

    August 26, 2025

    A16z spends $1.49 million on lobbying in Washington, with rivals mostly going outside

    August 25, 2025

    Openai warns against SPVs and other “unauthorized” investments

    August 23, 2025
TechBrunchTechBrunch

How to protect your startup from email scams

TechBrunchBy TechBrunchJuly 13, 20244 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Despite years of claims that the “death of email” is fast approaching, this decades-old method of communication still thrives in business – especially in the hacking business.

Emails that appear legitimate but contain malicious links are one of the most dangerous yet effective methods used by cybercriminals and have led to some of the biggest hacks in recent years, including the breach of telecommunications giant Twilio in 2022 and the hack of social media platform Reddit last year.

Sometimes these emails are easy to spot thanks to spelling mistakes or unusual email addresses, but as hackers become more sophisticated, it is becoming increasingly difficult to distinguish fraudulent emails from legitimate ones.

For example, Business Email Compromise (BEC) is a type of email-based attack that targets organizations large and small with the goal of stealing money, sensitive information, or both. In this type of scam, hackers impersonate or compromise someone close to the victim, such as a colleague, boss, or business partner, in order to trick them into unwittingly disclosing confidential information.

The risk this poses to businesses, especially startups, cannot be overstated: US individuals lost nearly $3 billion to BEC scams last year alone, according to the latest data from the FBI, and these attacks show no signs of slowing.

How to spot a business email compromise

Watch out for warning signs

Cybercriminals are getting more and more sophisticated in their email sending methods, but there are some simple warning signs to look out for: emails sent outside of normal business hours, misspelled names, mismatched sender and reply-to addresses, unusual links or attachments, and an unnecessary sense of urgency.

Contact the sender directly

Spear phishing (where hackers use personalized phishing emails to impersonate a senior executive within a company or an outside vendor) makes it nearly impossible to determine if the message came from a trusted source. If an email seems out of the ordinary (or looks unusual), contact the sender directly to verify the request rather than replying to the email or any phone number provided in the email.

Check with your IT person

Tech support scams are becoming more and more common. In 2022, Okta customers were targeted by a highly sophisticated scam in which attackers sent employees text messages with links to phishing sites that mimicked the look and feel of their employer's Okta login page. These login pages were so authentic that over 10,000 people submitted their work credentials. IT departments are unlikely to contact you via SMS, so if you suddenly receive random text messages or unexpected pop-up notifications on your device, it's important to check if they're legitimate.

Be (even) more careful with your phone

Cybercriminals have long used email as a weapon of choice. More recently, they have been using scam phone calls to hack into organizations. Last year, hotel chain MGM Resorts was reportedly hacked after a single phone call, with hackers tricking the company's service desk into granting them access to employee accounts. Always be suspicious of unexpected calls, even if they appear to be from legitimate contacts, and never share sensitive information over the phone.

Multi-factor everything!

Multi-factor authentication, which typically requires you to log in with a regulatory username and password in addition to a code, PIN, or fingerprint, is by no means foolproof. But adding an extra layer of security to easily hacked passwords makes it much harder for cybercriminals to access your email accounts. Deploying passwordless technologies such as hardware security keys and passkeys can add another layer of security to prevent information-stealing malware from stealing your passwords and session tokens.

Implementing stricter payment processes

In any type of cyberattack, the criminal's ultimate goal is to get money, and a successful BEC scam often relies on manipulating a single employee into making a wire transfer. Some financially motivated hackers will pose as a vendor and request payment for services they performed for your company. To reduce the risk of falling victim to this type of email scam, implement strict payment processes. Create payment authorization protocols, require employees to confirm transfers through alternative communication methods, and instruct your finance team to double-check any changed bank account details.

You can also ignore

Ultimately, your risk of falling victim to most BEC scams can be minimized by simply ignoring the attempt and moving on. If you're not sure if your boss really wants you to buy $500 worth of gift cards, ignore them. If you get an unexpected call, hang up. But for the sake of your security team and your colleagues, don't stay silent. Report the attempt to your workplace or IT department and be vigilant.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

According to Transunion, hackers say they stole the personal information of 4.4 million customers

August 28, 2025

The FBI says that China's salt typhoon has hacked at least 200 US companies

August 27, 2025

US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

August 27, 2025

Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

August 26, 2025

Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

August 26, 2025

Thetruthspy phone spyware new security flaw puts victims at risk

August 25, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Mississippi's Age Guarantee Act Tests Decentralized Social Networks

August 28, 2025

Threads test how to share long format text on the platform

August 28, 2025

Do you hire AI, or are you a human being? Next frontier for Startup Ops in 2025

August 28, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.