We don’t normally use capital letters within our titles, because we don’t want to appear shouty. But there are times when we really need to hammer the message home. On this occasion we want to reinforce how vital telephone calls can be in helping to prevent a cyberattack. 

Too often hackers are able to attack businesses simply because that one vital telephone call hasn’t been made to check whether an email, letter or message is correct. 

When to make the call? 

As we all rely on digital communications to stay in touch we don’t spend so much time on the phone or talking face-to-face. Criminals are able to infiltrate our digital channels so it’s always best to speak to someone in person or over the phone, especially when in the situations below:

  • Any occasion where you are asked to do something quickly, particularly where money is involved. 
  • When the ‘Big Boss’ is asking for something – you must not feel too scared to get in touch. 
  • When you are the ‘Big Boss’ asking for something – and don’t get irritated if the recipient insists on checking who you are. 
  • Any time you are suspicious about what you’re being asked to do. 
  • BUT don’t rely on things looking suspicious – hackers are clever and are very good at making emails, for example, look legit. 
  • Before making any large monetary transactions. 
  • Before finalising a deal. 
  • BASICALLY – it’s best to make the call than not make the call… a few minutes spent on the phone could mean the difference between success and failure. 

Why call? 

To: 

  • Check what you’re being asked to do is correct. 
  • Confirm details of where to send any money or information. 
  • Slow down… give yourself (and others around you) time to think. 

Where to call? 

  • DO NOT call the number given on the email, letter or message. 
  • DO NOT call the number that you’ve been told to call. 
  • Research the number to make sure you’re calling the right person and not an impersonator. 

Why am I having to go through this rigmarole? 

Too often we hear about hackers who are patiently hanging around in the background waiting to pounce – waiting for the culmination of a big transaction. When the time is right, they strike, contacting the ‘victim’ with fraudulent details. They rely on victims being under pressure, lacking confidence to speak to managers/directors, needing to close the deal, lacking the necessary expertise and training… the list goes on! 

How to prepare 

  • Have a process in place to ensure plenty of checking takes place before a transaction. 
  • Make sure everyone in the team is aware of processes and is well-trained. 
  • Ensure your organisation has a culture where questioning is welcomed rather than viewed as a hindrance. 

Concerned? 

Please do ask us for help. We can offer guidance, help with processes and training, and firm up your cybersecurity measures.