[Audio: Real Leader] Now you've gone through the modules so far, you might think you have all the protections sorted.
But to be tricked by one of the most common scams out there…
[Audio: Fake Leader] …all you need to do is click a link.
[Visual] Unmask Cyber Crime intro graphic - Episode 5 - How to Spot Phishing
[Visual] Montage of the unmasked real leader flickering through different outfits to represent different business Industries Including, real estate, accounting, construction, retail, hospitality, floristry and farming.
[Audio: Real Leader] Say you're leading a tech firm. Your team may have seen emails come through from someone who looks suspiciously like...you.
[Audio: Fake Leader] When actually…it's me.
[Audio: Real Leader] Maybe they've received a message from 'you' asking them to urgently authorize a payment, update business data, or even organize gift cards.
[Audio: Fake Leader] Guilty!
[Audio: Real Leader] Or they might receive a phone call from a strange number, asking a whole bunch of strange questions…or even questions that seem pretty innocent.
[Audio: Fake Leader] Hello, it's your bank, I just need your account number, right now... Pleassssssseeee.
[Audio: Real Leader] Or it might be a text, asking you to click a link.
[Audio: Fake Leader] Click here!
[Audio: Real Leader] These are all examples of phishing, where your team think something is coming from someone, they trust…like you.
[Audio: Fake Leader] Surprise, I am you!
[Audio: Real Leader] Any action they ask them to do is designed to undermine your security.
Clicking links, sharing personal information, sending funds in an unexpected way, and acting with urgency.
[Audio: Fake Leader] The faster the better. So, your team don’t have time to stop and think that maybe I'm not you.
[Audio: Real Leader] Sometimes, they'll change your company's email slightly.
[Audio: Fake Leader] Oh you're .co.nz? Well I'll use .com
[Audio: Real Leader] The messages might even threaten your staff – through the pretence of being you – if they don't act on 'your' request.
[Audio: Fake Leader] ….oops.
[Audio: Real Leader] Let's have a look at some scam emails so you can recognise them.
[Visual] Graphic of a sample email from Inland Revenue appears with the scam email address highlighted to show it's from a completely different sender
Here you can see that this email address isn't even remotely connected to who it’s claiming to be from.
[Audio: Fake Leader] Hey, I tried.
[Audio: Real Leader] Or when you hover over the link it’s trying to get you to click, it suddenly appears as a much longer looking link.
[Visual] Graphic of a sample phishing email from Inland Revenue appears with link in the email highlighted to show It goes to a different scam URL than stated
[Audio: Fake Leader] It's all well and good to know what you're looking for; I won't stop sending them as you. Someone you know will click them.
[Audio: Real Leader] But
[Visual] Montage of the unmasked real leader and masked fake leader flickering through different outfits to represent different business Industries Including, real estate, accounting, construction, retail, hospitality, floristry and farming.
[Audio: Real Leader] …all business leaders can take simple steps to protect your team from being phished. Even on the farm.
[Audio: Fake Leader] You don't need to do that.
[Audio: Real Leader] Implement security measures like email filtering and antispam, to stop phishing emails from making their way to you.
[Visual] Graphic appears on screen - Implement email filtering and anti-spam
[Audio: Fake Leader] Don’t you want to hear from your boss?
[Audio: Real Leader] Make sure there's antivirus software on any device concerning your business, to identify those dodgy email attachments before you open them.
[Visual] Graphic appears on screen - Install antivirus software
[Audio: Fake Leader] Who you calling dodgy?
[Audio: Real Leader] Conduct regular training on phishing so your team are aware of the signs – especially as times and techniques change, and cyber security tools adapt.
[Visual] Graphic appears on screen - Run phishing training sessions
[Audio: Real Leader] Any request to alter business or payment information should always be independently verified via a different channel. Using E-Invoicing for sending invoices is a great way to send Important Information more securely.
Ask your email provider to help you enable SPF, DMARC and DKIM to stop criminals spoofing your business' email addresses.
[Visual] Graphic appears on screen:
- SPF: Sender Policy Framework
- DMARC: Domain-based Message Authentication Report and Conformance
- DKIM: Domain Keys Identified Mail
[Audio: Fake Leader] Ahhh don't reach out to them that's too much of a hassle.
[Audio: Real Leader] And that's how you can help your business avoid phishing scams. So, those are all the ways you can Unmask Cyber Crime. For more ways to protect your business from scammers like them, head to www.ownyouronline.govt.nz
[Visual] Graphic on screen ownyouronline.govt.nz
[Audio: Fake Leader] Or…don't.
[Visual] Unmask Cyber Crime graphic leading to end screen slide with Own Your Online - Learn how to protect yourself online at ownyouronlinw.govt.nz/business.