{"id":4037,"date":"2019-06-28T16:00:11","date_gmt":"2019-06-28T14:00:11","guid":{"rendered":"https:\/\/www.retarus.com\/blog\/en\/ceo-fraud-has-met-its-match"},"modified":"2023-04-25T09:29:43","modified_gmt":"2023-04-25T07:29:43","slug":"ceo-fraud-has-met-its-match","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/blog\/en\/ceo-fraud-has-met-its-match\/","title":{"rendered":"CEO fraud has met its match"},"content":{"rendered":"\n
Companies\nare being ripped off left, right and center by cyber scammers impersonating\nCEOs and ordering confidential financial transactions to be carried out. Steps\ncan be taken, however, to protect your organization \u2013 including technical\nmeasures. <\/p>\n\n\n\n
Over the\npast month two fascinating articles relating to CEO fraud have caught my eye \u2013 an\ninteresting piece in the German \u201cHandelsblatt\u201d\nnewspaper<\/a>, which reports\non a case of attempted fraud at Ritter Sport that thankfully failed, and an\ninformative feature by the \u201cdigital pioneers\u201d at \u201ct3n\u201d<\/a> illustrating vividly how the CEO\nscam works by looking at examples from their very own company. <\/p>\n\n\n\n These kinds of details are important in combating an issue which \u2013 unlike the rather similar \u201clong-lost relative\u201d scam rife in more private settings \u2013 remains surprisingly unknown across the business world, despite the best efforts of BSI and other organizations. Only staff who have been suitably sensitized and are alert to the potential threat will be able to unmask a virtual attempt to impersonate an authority figure in time and prevent the fraud effectively. <\/p>\n\n\n\n In addition to trainings offered to users to avoid business email compromise, technical tools also provide effective assistance in the fight against CEO fraud. Retarus\u2019 Email Security, for instance, includes a CxO Fraud Detection function<\/a> in the ATP package (Advanced Threat Protection<\/a>). This service subjects emails to an algorithmic check, which identifies \u201cFrom-Spoofing\u201d and \u201cDomain-Spoofing\u201d amongst other functions. This facilitates the dependable identification of messages from fake sender addresses, allowing them to be filtered out. More details are available on our website<\/a> or directly from your local Retarus representative<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":" Companies are being ripped off left, right and center by cyber scammers impersonating CEOs and ordering confidential financial transactions to be carried out. Steps can be taken, however, to protect your organization \u2013 including technical measures.<\/p>\n","protected":false},"author":14,"featured_media":4034,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_s2mail":"yes","footnotes":""},"categories":[15],"tags":[738,102],"dipi_cpt_category":[],"class_list":["post-4037","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-cxo-fraud-detection","tag-email-security"],"acf":[],"yoast_head":"\n