094 90 48200     Get SUPPORT

Aniar IT Services Blog

Even Amazon Can Be Hacked

Even Amazon Can Be Hacked

In 2018, Amazon was struck by a considerable attack, with hackers taking funds from approximately 100 seller accounts, according to a Bloomberg report. Between May and October 2018, Amazon sellers were struck approximately 100 times, draining funds from the seller control platform to augment their own funds. According to the investigation, the first fraudulent transaction took place on May 16, 2018, with an undisclosed amount being stolen. The hackers utilized phishing attacks in order to scam their targets.

“Unknown Hack”

On May 8, 2019, almost a year to the day after the first transaction was made, an Amazon spokesperson claimed that the company had completed investigating the compromised accounts, and had been the victim of an “extensive” fraud. The extent of the fraud was large enough where two banking companies, Barclays and Prepay Technologies (who is a partial subsidiary of Mastercard) are caught up in the crime.

Ultimately, Amazon neglected to disclose the true scope of the hack, but a report by Bloomberg indicated that over one billion dollars were dispersed to merchants in 2018 via Amazon Capital Services U.K. While there is currently no figure provided by the company, if large portions of that money was subverted, it could rank as one of the largest hacks in the history of online commerce, and certainly the biggest fraud that has involved Amazon. 

Amazon, which has a business model built to be largely automated, has done a remarkable job of keeping personally identifiable information from being hacked over the years, but in today’s threat-persistent culture, even the most secure companies can have situations happen to them that jeopardize their ability to complete financial and information transactions, regardless of how much they invest in cybersecurity.

Phishing Attacks

Just because this article mentions a major fraud involving the world’s largest online retailer in no way means that hackers have moved on from trying to hack small businesses. Small businesses face the majority of hacking attacks, mainly because they have the least amount of security to thwart. In fact, if Amazon can fall victim to phishing attacks, it’s not a stretch to believe that your company is susceptible. With millions of phishing messages sent every day, many of which target small businesses, having a strategy to educate your staff is extremely important.

The best way to go about doing that is to be proactive. Getting your staff to understand that they are on the front lines of a never-ending cyberwar and what they need to learn in order to keep themselves, and your organization free from the serious risks that come from falling victim of phishing attacks. Some things you can prioritize:

  • Annual education and training - Have a comprehensive plan in place to educate new and current staff that is updated and required annually.
  • Having strong passwords - Since phishing is a form of social engineering, the hackers on the other end of the phishing attack are simply looking for access. Having strong passwords will keep them out much longer than weak ones. 
  • Avoid shadow IT - Make it clear that all software has to pass through IT first, before it is downloaded onto a workstation. It may seem inefficient at first, but the company will be better off vetting a software solution before it gains access to your organization’s network.
  • Provide cloud storage - When people are constantly on the move and have a lot of responsibilities, they will often upload their work into their personal cloud-based file storage. This can be risky behavior, even if the employee’s motives are solid. Keep your company’s data hosted on its own infrastructure.

With these four tips you can go a long way toward protecting your business, and your staff, from the detrimental characteristics of a phishing attack.

If you need help with your organization’s cybersecurity, or if you simply want some help outlining a strategy to use, contact the IT professionals at Aniar IT Services today at 094 90 48200 .

Tip of the Week: Using Digital Signage
Windows 7 and Windows Server 2008 R2 is Finally Lo...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 24 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy User Tips Productivity Email Cloud Google Network Security Hosted Solutions Hackers Innovation Tech Term Internet Microsoft Workplace Tips Data Communications Efficiency Hardware Data Backup Communication IT Support Business Data Recovery Cloud Computing Windows 10 Mobile Devices Small Business Smartphone Malware Software Android Smartphones Managed IT Services VoIP Computer Gadgets Network Collaboration IT Services Mobile Device Windows Browser Business Management Users Backup Spam Internet of Things Artificial Intelligence How To Server Information Office 365 Miscellaneous Phishing Router Chrome Cybersecurity Outsourced IT Business Continuity Saving Money Word Cybercrime Applications BDR Computers Data Storage Staff Windows 7 Microsoft Office Data Protection Vulnerability Managed Service Paperless Office Operating System Holiday Upgrade BYOD Ransomware Social Media Facebook Mobile Device Management Connectivity Remote Monitoring Money Two-factor Authentication Settings Display Encryption Data Security Passwords Quick Tips Keyboard Content Management Botnet VPN Apps Processor Password Disaster Recovery Government Spam Blocking Virtual Assistant Managed IT services Blockchain Redundancy Voice over Internet Protocol Automation Telephone Systems Bring Your Own Device IT Management Save Money Social Engineering Website Avoiding Downtime App Education Identity Theft Meetings Google Drive Telephone System Comparison Help Desk Google Docs Sports Machine Learning Private Cloud Access Control IT Plan Digital Signage Law Enforcement Cryptocurrency Telephony Wi-Fi CES OneNote Managed IT Fraud Virtualization Software as a Service Scam Training Augmented Reality Human Resources Update Infrastructure Unsupported Software Business Intelligence Smart Office HBO IT Infrastructure Practices Safe Mode Security Cameras 5G Cache Remote Worker Database Telecommuting Manufacturing Amazon Data loss Networking Shortcuts Hypervisor eWaste Computer Fan Thought Leadership The Internet of Things Microchip Computer Care Hacker Bandwidth Software Tips Save Time Wireless Internet Document Management Camera Outlook Investment Charger Hosted Computing Smartwatch Skype Wiring Business Technology Travel Remote Work Virtual Reality Amazon Web Services Cortana Accountants Alert Enterprise Content Management Mobility Vendor Management Legal FENG Big Data Search Engine Patch Management Hard Drive Password Manager Nanotechnology Proactive IT Tools Work/Life Balance HIPAA USB Frequently Asked Questions Recovery ROI Wireless Charging Inventory Health Start Menu Firewall Cabling Password Management Social Sync Multi-Factor Security Saving Time Criminal Millennials Digital Signature Servers Bing WiFi Business Mangement Solid State Drive Smart Tech MSP Net Neutrality Electronic Medical Records Downtime Wire Entertainment Warranty Excel GDPR Google Apps Windows 10s Employee Unified Threat Management Cables Online Shopping Screen Mirroring NIST Vendor Wireless Procurement Addiction Value Workforce OLED Credit Cards Employer-Employee Relationship PDF HVAC Flash Gmail Audit Physical Security File Sharing ISP Data Management Root Cause Analysis Printer Tip of the week Remote Computing Workers Specifications Mobile Computing Default App Evernote Cleaning Cast Trending Cryptomining Biometric Security HaaS Virtual Machine Recycling Devices YouTube Mouse Windows Server 2008 Windows Server 2008 R2 Public Cloud Authentication Google Search Tech Support Wireless Technology Search IBM Safety Productivity Company Culture Marketing Emergency CrashOverride Budget Customer Relationship Management Competition Managing Stress IP Address Managed Service Provider Printers Customer Service Twitter Hiring/Firing Mobile Office Personal Information Domains Fun Windows 10 Financial Compliance Public Speaking Presentation Employee/Employer Relationship Lithium-ion battery Hard Drives Regulation