{"id":3509,"date":"2017-04-22T10:16:44","date_gmt":"2017-04-22T14:16:44","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/?p=3509"},"modified":"2017-04-22T11:10:49","modified_gmt":"2017-04-22T15:10:49","slug":"how-to-prevent-ceo-fraud","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/2017\/04\/22\/how-to-prevent-ceo-fraud\/","title":{"rendered":"How to Prevent CEO Fraud"},"content":{"rendered":"<p>This is something that was made aware at my job that I believe is relevant to what we are learning in this program. It addresses social engineering in a high-level strategy by hackers. The security division shared some important notes with good suggestions that can help other companies too. They explain that as technology becomes more advanced, so do the schemes cyber thieves put together.\u00a0They went on to add that, \u201cOne of those is around CEO Fraud.\u00a0 This is where the cyber thief will use sophisticated social engineering tactics to trick employees into wiring funds to fraudulent accounts.\u201d These tactics include receiving a phone call from someone acting as if he\/she is part of senior executives.<\/p>\n<p>All, especially large organizations, should be prudent. For example, a cyber thief could also try to use an executive\u2019s email addresses to reach out to an employee asking to transfer large amount of money.\u00a0Another instance includes an employee received a call from someone pretending to be the CEO of a company asking for money.<\/p>\n<p>As a solution, employees must forward all suspicious emails to the appropriate security team(s). Moreover, it is highly recommended to ask whoever tries to call customer service for their phone number to call them back, then pass that information to a appropriate manager.\u00a0Chances are hackers will not provide one. Social engineering attack is on the rise, so it is in all companies\u2019 best interests to educate employees proper techniques to minimize the chances of being compromised.<\/p>\n<p><a href=\"http:\/\/www.cio.com\/article\/3136159\/security\/how-to-prevent-ceo-fraud.html\">http:\/\/www.cio.com\/article\/3136159\/security\/how-to-prevent-ceo-fraud.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is something that was made aware at my job that I believe is relevant to what we are learning in this program. It addresses social engineering in a high-level strategy by hackers. The security division shared some important notes with good suggestions that can help other companies too. They explain that as technology becomes [&hellip;]<\/p>\n","protected":false},"author":11666,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[717573],"tags":[],"class_list":{"0":"post-3509","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-13-disaster-recovery-business-continuity","7":"entry"},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8j0Bl-UB","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/users\/11666"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/comments?post=3509"}],"version-history":[{"count":4,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3509\/revisions"}],"predecessor-version":[{"id":3513,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3509\/revisions\/3513"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/media?parent=3509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/categories?post=3509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/tags?post=3509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}