Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Cyber ​​giant F5 Networks says government hackers gained “prolonged” access to its systems and stole code and customer data.

October 15, 2025

The entire Space Stage agenda for Disrupt 2025

October 15, 2025

Within 3 days to secure your exhibition table at Disrupt 2025

October 15, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Google brings Pixel 6 and new devices to Material3 Expressive, along with other features, to the Pixel 6 and new devices

    September 3, 2025

    Google's NoteBookLM now allows you to customize the tone of your AI podcasts

    September 3, 2025

    Roblox expands the use of age estimation techniques and introduces standardized assessments

    September 3, 2025

    Instagram finally launches the iPad app

    September 3, 2025

    Complete the 2025 Confusion Builder Stage Agenda with the Maximum Scaling Voice

    September 3, 2025
  • Crypto

    Coinbase expands investment in India's CoinDCX, with exchange value of $2.45 billion

    October 15, 2025

    Only 5 days left to reserve your exhibition table at Disrupt 2025

    October 13, 2025

    Kalsi's valuation reached $5 billion, days after rival Polymarket received $2 billion and $8 billion of backing on the NYSE.

    October 10, 2025

    Kalsi's valuation reached $5 billion, days after rival Polymarket acquired $2 billion on the New York Stock Exchange with $8 billion in backing.

    October 10, 2025

    India removes compliance failures with 25 crypto exchanges including BINGX, LBANK and COINW

    October 2, 2025
  • Security

    Cyber ​​giant F5 Networks says government hackers gained “prolonged” access to its systems and stole code and customer data.

    October 15, 2025

    Satellite found to be leaking unencrypted data including phone calls and some military communications

    October 14, 2025

    Homeland Security redeploys 'hundreds' of CISA cyber employees to help crack down on Trump's deportations

    October 10, 2025

    Spyware maker NSO Group confirms acquisition by US investor

    October 10, 2025

    Discord data breach affects at least 70,000 users

    October 9, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    The entire Space Stage agenda for Disrupt 2025

    October 15, 2025

    Within 3 days to secure your exhibition table at Disrupt 2025

    October 15, 2025

    3 days left: Save up to $624 with Disrupt 2025 Pass

    October 15, 2025

    You have 4 days to get your Disrupt 2025 exhibition table

    October 14, 2025

    4 days left: Save up to $624 with Disrupt 2025 Pass

    October 14, 2025
TechBrunchTechBrunch

How to protect your startup from email scams

TechBrunchBy TechBrunchJuly 13, 20244 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Despite years of claims that the “death of email” is fast approaching, this decades-old method of communication still thrives in business – especially in the hacking business.

Emails that appear legitimate but contain malicious links are one of the most dangerous yet effective methods used by cybercriminals and have led to some of the biggest hacks in recent years, including the breach of telecommunications giant Twilio in 2022 and the hack of social media platform Reddit last year.

Sometimes these emails are easy to spot thanks to spelling mistakes or unusual email addresses, but as hackers become more sophisticated, it is becoming increasingly difficult to distinguish fraudulent emails from legitimate ones.

For example, Business Email Compromise (BEC) is a type of email-based attack that targets organizations large and small with the goal of stealing money, sensitive information, or both. In this type of scam, hackers impersonate or compromise someone close to the victim, such as a colleague, boss, or business partner, in order to trick them into unwittingly disclosing confidential information.

The risk this poses to businesses, especially startups, cannot be overstated: US individuals lost nearly $3 billion to BEC scams last year alone, according to the latest data from the FBI, and these attacks show no signs of slowing.

How to spot a business email compromise

Watch out for warning signs

Cybercriminals are getting more and more sophisticated in their email sending methods, but there are some simple warning signs to look out for: emails sent outside of normal business hours, misspelled names, mismatched sender and reply-to addresses, unusual links or attachments, and an unnecessary sense of urgency.

Contact the sender directly

Spear phishing (where hackers use personalized phishing emails to impersonate a senior executive within a company or an outside vendor) makes it nearly impossible to determine if the message came from a trusted source. If an email seems out of the ordinary (or looks unusual), contact the sender directly to verify the request rather than replying to the email or any phone number provided in the email.

Check with your IT person

Tech support scams are becoming more and more common. In 2022, Okta customers were targeted by a highly sophisticated scam in which attackers sent employees text messages with links to phishing sites that mimicked the look and feel of their employer's Okta login page. These login pages were so authentic that over 10,000 people submitted their work credentials. IT departments are unlikely to contact you via SMS, so if you suddenly receive random text messages or unexpected pop-up notifications on your device, it's important to check if they're legitimate.

Be (even) more careful with your phone

Cybercriminals have long used email as a weapon of choice. More recently, they have been using scam phone calls to hack into organizations. Last year, hotel chain MGM Resorts was reportedly hacked after a single phone call, with hackers tricking the company's service desk into granting them access to employee accounts. Always be suspicious of unexpected calls, even if they appear to be from legitimate contacts, and never share sensitive information over the phone.

Multi-factor everything!

Multi-factor authentication, which typically requires you to log in with a regulatory username and password in addition to a code, PIN, or fingerprint, is by no means foolproof. But adding an extra layer of security to easily hacked passwords makes it much harder for cybercriminals to access your email accounts. Deploying passwordless technologies such as hardware security keys and passkeys can add another layer of security to prevent information-stealing malware from stealing your passwords and session tokens.

Implementing stricter payment processes

In any type of cyberattack, the criminal's ultimate goal is to get money, and a successful BEC scam often relies on manipulating a single employee into making a wire transfer. Some financially motivated hackers will pose as a vendor and request payment for services they performed for your company. To reduce the risk of falling victim to this type of email scam, implement strict payment processes. Create payment authorization protocols, require employees to confirm transfers through alternative communication methods, and instruct your finance team to double-check any changed bank account details.

You can also ignore

Ultimately, your risk of falling victim to most BEC scams can be minimized by simply ignoring the attempt and moving on. If you're not sure if your boss really wants you to buy $500 worth of gift cards, ignore them. If you get an unexpected call, hang up. But for the sake of your security team and your colleagues, don't stay silent. Report the attempt to your workplace or IT department and be vigilant.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Cyber ​​giant F5 Networks says government hackers gained “prolonged” access to its systems and stole code and customer data.

October 15, 2025

Satellite found to be leaking unencrypted data including phone calls and some military communications

October 14, 2025

Homeland Security redeploys 'hundreds' of CISA cyber employees to help crack down on Trump's deportations

October 10, 2025

Spyware maker NSO Group confirms acquisition by US investor

October 10, 2025

Discord data breach affects at least 70,000 users

October 9, 2025

Italian businessman's mobile phone targeted by Paragon spyware

October 9, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Cyber ​​giant F5 Networks says government hackers gained “prolonged” access to its systems and stole code and customer data.

October 15, 2025

The entire Space Stage agenda for Disrupt 2025

October 15, 2025

Within 3 days to secure your exhibition table at Disrupt 2025

October 15, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.