Cybercriminals

Cybercriminals are exploiting publicly available information and weaknesses in corporate email systems to trick small businesses into transferring large sums of money into fraudulent bank accounts, in schemes known as “corporate account takeover” or “business email fraud.”

The above issue is happening randomly in Lebanon for the past 1 year.

We changed the hosting of the emails along to the passwords.

But is this enough and do you have other solutions.

How can we identify if the mail received is fake

I really appreciate your feedback
Roy_HachacheAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

David Johnson, CD, MVPOwnerCommented:
Are you referring to phishing emails that purport to be from one party but instead are another.. i.e. jose@paypa1.com saying they are from jose@paypal.com. This and other schemes are not just limited to Lebanon but are world-wide..  There also is the phony invoice.. you get a bill for services that were never ordered nor a service performed.  Your question reads like a news release. And it is OLD news as this has been going on since email was envisioned.
Roy_HachacheAuthor Commented:
I know is since email was envisioned. but what are the solutions for such acts
David Johnson, CD, MVPOwnerCommented:
If you didn't ask for it, delete it. The only real solution is to be diligent and pay attention to what you click on.
Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Sajid Shaik MSystem AdminCommented:
Greetings,

you can find out the fake E-mails by it's headers...

how to check please follow the link

http://www.usethistip.com/2012/11/how-to-identify-fake-email-and-trace.html

about the e-mails security if you have a hosted e-mails then ask your e-mail hosting provider to add spam filters ... as well as at your client ends you can add antivirus with anti spam features.. (anti spam will detect the spam by checking the signatures and identifies the email as spam)

if you have Exchange on premises then you can go for E-mail security appliances like sonicwall Email securiyt applicane, or baracuda, cisco iron port etc, if you are considered about the cost tne you can go for cloud services for antispam or couud base firewall with antispam or email securiyt... as well.

so there are lot of things you can do but base on requirements and setup... it's changes..

all thebest
Roy_HachacheAuthor Commented:
so you are asking to train all staff. It is a human error.
Sajid Shaik MSystem AdminCommented:
Greetings,

David Johnson, is right even you use best of the security some time you'll receive bad emails ... so as an IT technical experts we have to guide them at-least if any e-mail which is not related to them or seems suspicious.. them junk the mail or delete the mail... it's a part of the best practice... above all  you have to take security measures as required...

all the best

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Security

From novice to tech pro — start learning today.