In a modern healthcare setting, the stethoscope and the blood pressure cuff aren’t the only…
Read More
Imagine you’re going about your day when suddenly you receive a text or email from the Managing Director. The head of the company is asking for your help. They’re out doing customer visits and someone else dropped the ball in providing gift cards. The Managing Director needs you to buy six £200 gift cards and text or email the information right away.
The message sender promises to reimburse you before the end of the day. Oh, and by the way, you won’t be able to reach them by phone for the next two hours because they’ll be in meetings. One last thing, this is a high priority. They need those gift cards urgently.
Would this kind of request make you pause and wonder? Or would you quickly pull out your credit card to do as the message asked?
A surprising number of employees fall for this gift card scam. There are also many variations. Such as your Managing Director being stuck without gas or some other dire situation that only you can help with.
This scam can come by text message or via email. What happens is that the unsuspecting employee buys the gift cards. They then send the numbers back. They find out later that the real company Managing Director wasn’t the one that contacted them. It was a phishing scammer.
The employee is out of the cash.
Without proper training, 32.4% of employees are prone to fall for a phishing scam.
Why Do Employees Fall for Phishing Scams?
Though the circumstances may be odd, many employees fall for this gift card scam. Hackers use social engineering tactics. They manipulate emotions to get the employee to follow through on the request.
Some of J700 Groups top social engineering tactics illicit the following:
- The employee is afraid of not doing as asked by a superior
- The employee jumps at the chance to save the day
- The employee doesn’t want to let their company down
- The employee may feel they can advance in their career by helping
The scam’s message is also crafted in a way to get the employee to act without thinking or checking. It includes a sense of urgency. The Managing Director needs the gift card details right away. Also, the message notes that the Managing Director will be out of touch for the next few hours. This decreases the chance the employee will try to contact the real Managing Director to check the validity of the text or email.
Blackburn Woman Scammed Out of More Than £6,000 from a Fake Managing Director Email
Variations of this scam are prevalent and can lead to significant financial losses. A company isn’t responsible if an employee falls for a scam and purchases gift cards with their own money.
In one example, a woman from Blackburn, Lancashire lost over £6,000. This was after getting an email request from who she thought was her company’s, Managing Director.
The woman received an email purporting to be from the company’s Managing Director. It stated that the Managing Director wanted to send gift cards to some selected staff that had gone above and beyond.
The email ended with “Can you help me purchase some gift cards today?” The Managing Director had a reputation for being great to employees, so the email did not seem out of character.
The woman bought the requested gift cards from Tesco and Marks & Spencer. Then she got another request asking to send a photo of the cards. Again, the wording in the message was very believable and non-threatening. It simply stated, “Can you take a picture, I’m putting this all on a spreadsheet.”
The woman ended up purchasing over £6,000 in gift cards that the scammer then stole. When she saw her Managing Director a little while later, her Managing Director knew nothing about the gift card request. The woman realized she was the victim of a scam.
Tips for Avoiding Costly Phishing Scams
Always Double Check Unusual Requests
Despite what a message might say about being unreachable, check in person or by phone anyhow. If you receive any unusual requests or one relating to money, verify it. Contact the person through other means to make sure it’s legitimate.
Don’t React Emotionally
Scammers often try to get victims to act before they have time to think. Just a few minutes of sitting back and looking at a message objectively is often all that’s needed to realize it’s a scam. Don’t react emotionally, instead ask if this seems real or is it out of the ordinary.
Get a Second Opinion
Ask a colleague, or better yet, your company’s IT service provider, to take look at the message. Getting a second opinion keeps you from reacting right away. It can save you from making a costly judgment error.
Need Help with Employee Phishing Awareness Training?
Phishing keeps getting more sophisticated all the time. Make sure your employee awareness training is up to date. Give one of our team at J700 Group, based Lancashire a call today to schedule a training session to shore up your team’s defenses.
J700 Group are a Lancashire-based, family-run, professional and responsive, Managed Solutions Provider helping Businesses, to utilise Innovative IT Consultancy Services, Cloud Solutions, Cyber Security, Microsoft 365, Telecoms, Web Design and SEO solutions to propel their organisation to the next level and beyond.
As an experienced IT Support Provider, helping businesses across Lancashire & Manchester, if you need any assistance with your IT including IT Hardware, a Disaster Recovery Policy or Managed Backup Solutions please get in touch with one of our team
Where to find us: Prinny Mill Business Centre, 68 Blackburn Road, Haslingden, Lancashire, BB4 5HL
#Phishing #PhishingScams #PhishingAwareness #Smishing #ITSecurity
When people hear the word cybersecurity, they often imagine complex systems, expensive software and specialist…
Read MoreAs we count down to midnight, most of us are thinking about gym memberships or…
Read MoreIt’s Christmas Eve in Lancashire. The Preston bypass is a nightmare, the last-minute dash to…
Read MoreFor many businesses, the Christmas period means quieter offices, reduced staffing and systems left running…
Read MoreOr: Why we’d like to have a word with Tim Cook this Christmas. There are…
Read MoreHackers Love Christmas: Learn Why your Business Could be at Risk This Holiday SeasonThe festive…
Read MoreIn recent months, high-profile companies like Land Rover and Co-op have made headlines due to…
Read MoreExplore 7 essential tips for effective cloud solutions comparison to find the best fit for…
Read MoreLearn how to secure business data for UK SMEs with this step-by-step guide focused on…
Read MoreCybersecurity basics explained for UK businesses—core concepts, major threats, essential safeguards, and compliance requirements. A…
Read MoreDiscover the essential role of IT support desks, core functions, key benefits, types of support,…
Read MoreDiscover 10 microsoft 365 alternatives for UK SMEs, comparing features and benefits to help your…
Read MoreDiscover the best microsoft 365 alternatives in our comparison of 10 top products to enhance…
Read MoreDiscover a business connectivity checklist with 7 actionable steps to boost IT reliability, security, and…
Read MoreDiscover 7 essential business continuity planning steps to protect your SME. Learn practical strategies for…
Read MoreSmall Business Office 365 comprehensive guide for UK SMEs: core features, setup process, security essentials,…
Read MoreSmall Business Office 365 guide for UK firms. Learn core features, setup, security, costs, and…
Read MoreSmall business Office 365 guide covering essential features, security, costs, local support, and practical benefits…
Read MoreFollow this cybersecurity checklist for SMEs to secure your business in Lancashire and Manchester. Step-by-step…
Read MoreFollow this cybersecurity checklist for SMEs to boost protection, reduce risks, and secure business data…
Read MoreCloud security explained: A comprehensive guide for UK businesses covering threat types, protection strategies, compliance,…
Read MoreData protection strategies for UK SMEs—types, key components, GDPR compliance, business risks, and best practices…
Read MoreWhy cybersecurity matters for UK businesses: core concepts, main risks, common threats, legal requirements, and…
Read MoreComprehensive guide to IT issues Lancashire businesses face, including security threats, system downtime, cloud solutions,…
Read MoreComprehensive guide on cyber security threats in the UK. Learn common types, key characteristics, real-world…
Read MoreFollow this IT security checklist for a step-by-step process to secure your business effectively in…
Read MoreExplore the benefits of managed IT services for businesses in Manchester and Lancashire, enhancing efficiency…
Read MoreExplore the role of cybersecurity in business. Understand its importance, how it works, and key…
Read MoreDiscover 7 key advantages of Microsoft 365 for SMEs that can enhance productivity, collaboration, and…
Read MoreExplore why use managed IT services and how they benefit businesses. Gain comprehensive insights on…
Read MoreComprehensive guide explaining cyber threats, focusing on their importance, how they work, and the key…
Read MoreDiscover what is business continuity and why it matters for your business's resilience, sustainability, and…
Read MoreDiscover effective ways to secure business data through a step-by-step process, ensuring the safety and…
Read MoreDiscover 7 key advantages of Microsoft 365 that can enhance your business operations and productivity…
Read MoreExplore local IT services explained in detail, focusing on their importance and how they work…
Read MoreExplore cloud application hosting, its importance, how it operates, and the key concepts behind it…
Read MoreExplore why choose cloud solutions for your business. Discover how they work, their importance, and…
Read MoreExplore cyber security services for small business, their importance, and how they protect against online…
Read MoreFollow this IT support checklist for a systematic approach to IT maintenance. Ensure smooth operations…
Read More