(855) ER-TECH-1
healthcare managed it services
msp healthcare
(855) ER-TECH-1

Don’t Get Your Money Stolen: How to Protect Your Company from Payroll Fraud

Nov 05, 2020

Your payroll department is where the money’s at, and cybercriminals are thinking of clever ways to get some of that.


Email communication has become more frequent during the remote work period that started in 2020. According to Google, 18 million COVID-19 hoax emails are sent to Gmail users every day.


With phishing scams and other types of cybercrimes becoming more rampant, your payroll officers are now more susceptible to attacks.

How scammers attack your payroll

Scammers use powerful psychological techniques like social engineering to manipulate victims to take action immediately. 


Payroll fraud is just one of the recent additions to the tricks up their sleeves. According to The Wall Street Journal’s report about email scams, there were 23,775 scam complaints filed with the FBI last 2019, with an estimated annual loss of around $1.7 billion.


Scammers pull this off by sending fake emails to unsuspecting employees. They pretend to be someone with authority within the company like the payroll department, HR team, or the boss. This makes the employee more inclined to follow their requests. 


The scammers will urge the employee to change their bank accounts or wire their money to another bank account. 

BOOST YOUR PROTECTION AGAINST CYBERTHREATS


So how exactly do they pull this off? Here are some of the most common ways scammers attack your payroll:


They do targeted attacks instead of mass-produced ones.

Payroll fraud attackers select their potential victim carefully and they gather not only their corporate details but personal ones as well.


They even track their social media accounts to know when they’re on vacation so they can tailor their message based on that information.


They impersonate an employee making victims think they’re actually talking to a colleague.

If they don’t use regular public domains like @gmail.com, they will create an email domain that mimics a company’s official email domain.


They will also attempt to sound like how the impersonated employee usually does in an email:


Howdy, Payroll!


Heyyy how are you? I have switched to another bank and would like to update my deposit information. Please do the needful.


In this example, hackers have studied and used the employee’s distinct greeting and choice of words.


They urge you to act immediately.

Their emails usually come with subject lines like “Urgent payroll request” or something that pushes you to take immediate action.


They may also indicate in the email body that it’s an emergency or that there is a consequence if this is not acted upon right away.


If you take time to think before acting, you are more likely to notice that something is off. That’s why hackers want you to hurry, sometimes, even panic.


What to do if you spot a possible payroll scam

Email communication is one of the most common ways employees coordinate with one another, especially when a significant number of them are working remotely. That’s why payroll fraud through email phishing is one of the favorite routes cybercriminals take. 


Here are specific actions that you can take if you spot a possible payroll scam:


Do not respond.

The simplest yet perhaps the best course of action is to leave the email unreplied.


The hackers will probably move on to another target or make another attempt soon. Hopefully, you’re still careful the next time around.


Contact the employee to verify.

Look up the employee’s email address listed in your company database and send a separate message to confirm the request.


If possible, set up a quick video call through secure tools like Google Meet to see and hear the request from the employee themself.


Report to IT staff immediately.

Inform your IT staff so they can block these hackers and conduct further security checks.


If you don’t have an in-house IT staff and would like to partner with highly-trained IT experts as soon as possible, contact a managed service provider (MSP) like ER Tech Pros.


MSPs can monitor your entire system and install the necessary detection tools to each of your devices to protect your business from multiple kinds of cyberattacks.

GET COST-EFFECTIVE AND RELIABLE IT STAFF NOW


How to prevent payroll attacks

Being mindful with every single email you come across will come a long way. You can further reduce the risks of payroll attacks by taking the following steps:


Increase employee awareness. 

Your employees play an important role in combating these threats. Educate your employees about the different kinds of risks that can lurk in their inboxes. If you can, have your IT service provider conduct seminars to increase your employees’ cybersecurity awareness.


The whole organization needs to understand why it’s important to have proper email etiquette and be vigilant even when they’re corresponding with their closest coworkers.


It should be emphasized that everyone in the organization has a responsibility to protect the company. After all, if the company falls victim to scammers, everyone will be affected.


Implement multi-factor authentication (MFA).

If cybercriminals are eyeing your payroll department, that means more kinds of attacks are possible in the future.


MFA is a simple but highly effective tool used to add an extra layer of security that can potentially block 99% of payroll fraud attempts.


Coordinate with a certified MFA technology seller if you’re serious in boosting the security of your business.


Related Article: What is MFA and How Can It Protect Your Practice?

TRY MFA FOR FREE!


Update your anti-malware tools regularly.

Payroll frauds, as well as other types of cyberattacks, are constantly evolving. Keep your tools up to date so they can detect the newest security threats.


It can be quite tempting to close those pesky update notifications and get on with whatever you want to do on your computer, but these updates fix bugs and add enhancements to your existing software programs. So it’s important to encourage everyone in your organization to avoid skipping them.


Upgrade your free email service to a more secure one.

We all want to save money, and email service providers like Gmail have helped small businesses with their free version.


However, upgrading your email service to a more secure version gives you long-term benefits. A boost in security against breaches and other cyberthreats is an obvious one. You’ll also enjoy additional email tools and a larger (or even unlimited!) storage capacity.


You’re probably already using Gmail and other tools in G Suite like Google Docs , Sheets , Slides , and Forms. If you’re considering an upgrade, get a discount by upgrading through a certified G Suite partner.

UPGRADE YOUR EMAIL SERVICE NOW


How we can help improve your payroll security and protect your money

Cybercriminals are constantly changing and improving their fraudulent techniques. Meanwhile, companies are having a shortage of IT experts capable of keeping them away.


By learning how to spot possible attacks and following the tips presented, you’ll be able to mitigate the majority of the attacks that can harm your business.


If you need to tighten your IT security, reach out to us immediately so we can evaluate your IT infrastructure and determine what needs to be done.

Related Article: How Gift Card Scams Work and How to Avoid Being a Victim

Make sure that you’re always steps ahead of cyberthreats.

TALK TO US TODAY

Search Articles

data diddling
By Aprillice Alvez 15 Apr, 2024
Protect your healthcare practice from data diddling by educating your team on vulnerabilities and investing in prevention techniques like data validation.
A businessman wearing headphones uses a cloud phone system to do business communications
By Karen Larsen 29 Feb, 2024
The business world is steadily shifting to cloud communications. Our new blog post gives you a few reasons why you should, too. Read on to learn more.
A digital brain is sitting on top of a computer motherboard, symbolizing AI in cybersecurity
By Karen Larsen 14 Feb, 2024
While AI can revolutionize cybersecurity practices, it can also expand the attack surface. How do you balance the risks & benefits of AI in cybersecurity?
A man is typing on a laptop computer with an email alert on the screen
By Karen Larsen 05 Feb, 2024
Phishing is the primary way cybercriminals access our healthcare systems. Our new blog post shows you how to stop an email phishing attack in its tracks.
An employee's laptop on a desk, showing the need for cybersecurity best practices in remote work
By Karen Larsen 22 Dec, 2023
Remote work is revolutionizing the world, but if you want it to work for your business, you’ll need to step up your cybersecurity game.
Mobile phone  displaying a health app with a padlock and a shield on it
By Karen Larsen 18 Dec, 2023
As the world becomes increasingly digital, thousands of patients and providers are downloading the first mobile health app they find. Here’s why you shouldn’t.
A stethoscope placed on a remote healthcare device, showing the connection between MSP & healthcare
By Karen Larsen 30 Nov, 2023
Remote healthcare is here to stay. Do you have the IT expertise to navigate it? Find out how partnering with an MSP can transform how you deliver care.
Computer keyboard with a key specifically for cloud network security
By Karen Larsen 15 Nov, 2023
Thanks to the massive influx of cloud technology, businesses are future-proofing their operations with cloud-based security. Here’s why you should, too!
A fingerprint staying securely on a circuit board symbolizing MFA benefits and cybersecurity
By Karen Larsen 03 Nov, 2023
Multifactor authentication (MFA) prevents 99.9% of account compromise attacks. Find out how MFA protects your business and why you must implement it ASAP.
Cloud securely stores data from a microchip and utilizing powerful ransomware prevention
By Karen Larsen 23 Oct, 2023
Falling victim to a ransomware attack can ruin everything you worked so hard to build. Here’s how you can keep cybercriminals out of your cloud environments.
Show More

Healthcare & Tech Articles

data diddling
By Aprillice Alvez 15 Apr, 2024
Protect your healthcare practice from data diddling by educating your team on vulnerabilities and investing in prevention techniques like data validation.
A businessman wearing headphones uses a cloud phone system to do business communications
By Karen Larsen 29 Feb, 2024
The business world is steadily shifting to cloud communications. Our new blog post gives you a few reasons why you should, too. Read on to learn more.
A digital brain is sitting on top of a computer motherboard, symbolizing AI in cybersecurity
By Karen Larsen 14 Feb, 2024
While AI can revolutionize cybersecurity practices, it can also expand the attack surface. How do you balance the risks & benefits of AI in cybersecurity?
More Posts
Share by: