The attack in question is called the CEO-fraud and it is more and more frequent due to the increase in teams working remotely from their homes…

Delivery times for IT equipment are currently very variable.
Don't put your project at risk and anticipate your orders!
Phishing is the most reported type of attack according to Interpol. Attackers use this technique to obtain confidential or sensitive information (e.g. account details and access data) by sending a fake message requesting a password or account change. Scroll down for some tips to avoid these attacks.
The word “phishing” is a combination of the words “password”, “harvesting” and “fishing”. Fraudsters will send their victims a fake but very realistic email requesting account password changes by clicking on a fraudulent link and save this stolen information for later use. Here are some recommendations from the NCSC.
The characteristics of these attacks:
What you can do
It is important to remember that it is almost impossible to prevent fraudulent emails of this kind from being sent. Basic NCSC recommendations are:
If you get phished
✓ Immediately change your password directly on your account page and respect password recommendations.
✓ Report the case to the local police and to the NCSC through this form.
✓ Contact the company whose account information you believe was stolen and explain the situation to regain control of your data.
✓ Warn the rest of your team, they might try the same attack on your colleagues.
A few resources for more information
Stay up to date on the habits to develop for safe online surfing with these excellent resources.
The attack in question is called the CEO-fraud and it is more and more frequent due to the increase in teams working remotely from their homes…
💸 A particularly sensitive time Large companies are targeted for their important funds, but smaller companies and startups represent easy targets because of their smaller structures. Startups for example are targeted because they often will be reaching out to investors for financial support. This will seem like an ideal time for cyberattacks. One attack in particular is ransomware (also known as encryption Trojans or blackmail Trojans).