Exposing your network to bad files could cost your business a substantial sum of money.
Per an Internet Crime Report published by the FBI in 2015, Business Email Compromise (BEC) was the leading type of Internet crime resulting in over $246 million in damages. BEC is just one of the many cyber scams that have emerged over the past decade. According to the FBI, BEC is a sophisticated scam which targets businesses that conduct wire transfers on a regular basis or commonly deal with foreign suppliers. In addition to social engineering techniques, scams like these can also be carried out via computer intrusion methods all to complete unauthorized transfers of funds.
In addition to relying on the fact we are so busy, deception of end-users is one of the most common tactics utilized by cybercriminals to compromise the overall security of a network. Unfortunately, attackers continue to find ways to fool people into opening malicious email attachments by making these files appear to be legitimate. Thus, it’s paramount to examine the full name of every file before downloading them because cybercriminals are known to add and hide malicious file extensions intentionally. For instance, an executable (.exe) file is capable of being run as a program in a computer and compromise its stability and the overall security of a network.
Consider these simple rules to differentiate a sound file from one that is potentially dangerous:
If you receive an email from someone you don’t know or trust or aren’t expecting, don’t open it!
If you receive an email attachment from someone you DO know and trust, but you weren’t expecting the email, or it looks a little fishy, don’t open it!
Call the sender to verify the email is legit first.
Here are some general examples of safe vs. (potentially) bad files:
Potentially Dangerous Files:
Although not all executable (.exe) files are viruses, it’s important to remember that you should always remain vigilant regarding opening this file type as well as some of the various other extensions listed in the chart above.
To protect your business and customer data, Garner IT recommends company-wide network policies to display file extensions to increase awareness. While it is helpful to differentiate safe files from unsafe files by posting them in a clear and precise fashion, it is also critical that end-users understand the differences between each of the specific file extensions that they encounter.
Since applying our recommendation makes the full file name visible, Garner IT also stresses another critical consideration regarding renaming files – remember to only rename text to the LEFT of the file extension, as shown in green: Invoice.doc. Changing the file extension will render the data unusable.
Are bad files impacting the security of your business information and thus your bottom line? If so, then you are strongly encouraged to contact us at Garner IT for cost-effective IT solutions by calling our office at 850.250.3210 or drop by our offices at 1330 Harrison Avenue in Panama City, Florida. Home of the FREE Network Health Check.
Randall and Julie Garner and the entire Garner IT team of professionals.