The Importance of Being Vigilant on the Internet | Microbyte

The Importance of Being Vigilant on the Internet

Will Gott

Are we getting too comfortable with giving out our data these days? With the emergence of Chat GPT, everyone seems more than happy to share even more than they were before! People are giving more, because Ai is becoming ever more articulate and bespoke in terms of its response. We are all aware of cyber threats and internet fraudsters, but how many of us think along the lines of “this will never happen to me” or “I would know for sure if I received a dodgy link”?

Some real-life examples now have me thinking even harder about how serious the risk is, and how a single action from someone in an Accounts team could ultimately cost a business thousands of pounds.

Take a moment to consider your company assets. Do you have expensive laptops and mobile phones in your offices? Do you have valuable machinery in your warehouses? At night when you go home, do you leave your buildings unlocked for anyone to walk in and help themselves to these assets? Do you allow all of your staff access to every piece of equipment and machinery? I am sure you have procedures in place to secure your building, your stock and your other physical assets.

The same must be said for data

Here at Microbyte, we are constantly working internally and with our clients to ensure that data is as secure as possible. What I would like you to think about is what happens beyond that? What happens when a fraudster or spam emails bypass the security measures and allows someone to ‘walk’ into your business potentially accessing emails and bank accounts?

Before the days of internet banking, all we really had to worry about was someone getting hold of our chequebooks and writing a fraudulent cheque. It seems hard to believe that many years ago when I worked for a High Street bank, there would be one person responsible each day for checking all presented cheques over £1000 in value. Signatures would be checked and any unusual amounts or payees would be clarified with the account holder. At this point, the cheque could still be ‘stopped’ and the funds be reversed.

Today, with the advances in internet banking, we can send thousands of pounds at the click of a button, from our PCs, our phones and even our smartwatches. There is no recalling these payments, no stopping them and no reversing the transaction. It is so easy to do that perhaps we are less vigilant. Are we really thinking about the value of this payment and the potential loss to our company if something goes wrong?

If you have access to company bank accounts or sensitive information, you are holding the entire company cash assets in your hands. So, if you receive an accounting request you must be equally mindful of acting on this, even if you deal with the sender regularly. The person who is apparently sending the request may be a victim of hacking in their own right.

Imagine if you were paying someone a large amount of cash. Let’s say you have the arrangement to pay the owner of a business £25,000 for payment of their previous months’ invoices. You arrive at the business with your bag of cash and an unknown staff member greets you and says they have been asked to take the cash on the owner’s behalf.

Would you hand it over? I imagine not! So take a moment to think about what you would do if you received an email asking you to send a payment to a different bank account from the one you normally send to.

Fraudsters are regularly attempting to access mailboxes. Are you aware that just by clicking on a link, you are one step closer to enabling a hacker to gain access to your mailbox? They will then wait for the right moment to intercept a relevant email thread. There have been reports stating that emails from fraudsters advising of new bank details have been sent from genuine mailboxes.  Recipients have acted on this and subsequently sent money to incorrect bank accounts.

Within our Accounts department, we have procedures in place to significantly reduce the risk of this happening. We would never act on an email from anyone (even if it looked to have been sent from the business owner’s email address) asking us to send money to any other bank account other than the one specified on their invoices. Requests of this nature would always be followed up by a phone call to the business owner and unless we could positively identify him or her, we would not act on the request.

Do you have similar procedures in place?

I am sure you all will have at some point, received an email from a bank asking you to follow a link to reset/enter your password. Never ever do this. The emails are rarely (if ever) genuine. Media reports tell of hackers obtaining access to bank accounts in this way. Funds are moved quickly before anyone realises.

Please ensure that staff with access to bank accounts are fully aware of all such risks. Perhaps implement a procedure where you have dual access or limited access for certain staff members. Fraudsters are becoming more and more competent and are catching all IT users unaware. They are targeting us in so many ways and it takes just minutes for our bank accounts to be compromised once they have access.

Be wary also of internal spam – these are emails which seem to have come from a colleague containing payment requests. Do not act on these emails unless you are 100% sure this is genuine. You would be surprised at how genuine these emails can look – I have had several. Why not consider a procedure involving a payment requisition form which should be signed by an authorised member of your business?

Finally, please do stay aware of any data you provide whether willingly or accidentally, as you never know where it might end up.

Similar blogs

Do Small Businesses Really Need IT Support

Do Small Businesses Really Need IT Support?

Professional IT support provides the infrastructure management, security controls, and technical maintenance required for smooth daily business operations. Managed IT services replace “Do-It-Yourself” (DIY) and reactive methods with standardised processes that greatly improve system availability, data protection, and regulatory compliance. Why Do Small Businesses Need Professional IT Support? Modern Small and Medium-sized Enterprises (SMEs) use…

Read More

Avatar photo

Do I Really Need 247 IT Support

Do I Really Need 24/7 IT Support?

Your IT systems run continuously, they don’t stop on Friday evening. For SMEs in the UK, USA, and Dubai, “business hours” are a thing of the past because global supply chains and hybrid workforces operate around the clock. This article looks at the need for 24/7 IT support and explains the difference between reactive fixes…

Read More

Avatar photo

Small Business IT Blindspots

Small Business IT Blindspots

Blindspots are never a good thing – especially when it comes to your business.  Small business IT blindspots are unmanaged components within an organisation’s technology infrastructure.  These can be gaps in software, hardware, or day-to-day processes – places the IT team isn’t actively watching. For SMEs in the UK, the US, and Dubai, those blindspots…

Read More

Avatar photo

Top Cybersecurity Risks For Small Businesses

Top Cybersecurity Risks For Small Businesses

Cyberattacks against UK SMEs are extremely common, with between 43% and 50% of UK SMEs having experienced a cyberattack in the last 12 months. These criminals often use automated tools to identify weaknesses in IT systems and run attacks without any human involvement.  Understanding these risks can help SMEs plan appropriate security measures to avoid…

Read More

Avatar photo

How to Build a Scalable IT Infrastructure for UK SMEs

How to Build a Scalable IT Infrastructure for UK SMEs

It’s exciting to build a business that starts to find its feet. Although growing too fast can introduce its own complications. Move quickly enough, and the technology underneath you begins to strain – the tools that once felt effortless start slowing people down.  Your IT setup has to evolve with the team and customer base,…

Read More

Avatar photo

The Ultimate UK Guide to Common IT Support Problems (And How to Solve Them) 1

The Ultimate UK Guide to Common IT Support Problems (And How to Solve Them)

Common IT support problems are rarely one-off incidents. They repeat, they escalate, and left unaddressed, they compound into serious disruptions for the business. They tend to show up in places like identity management, connectivity, hardware performance, and cloud systems. Some issues feel random at first glance – they drift in, disappear, then surface again –…

Read More

Avatar photo