97色伦午夜国产亚洲精品-欧美大胆老熟妇乱子伦视频-国产精品国产三级国产aⅴ下载-av在线无码专区一区-国产精品久久久久久无毒不卡

Home About us News center Products Innovation Careers
industry news
company news
industry news
media focus
video
Cyber crime victim raises awareness for MAPP members
 
 

By Catherine Kavanaugh
STAFF REPORTER
Published: October 28, 2014 1:49 pm ET
Updated: October 28, 2014 3:36 pm ET



INDIANAPOLIS — Cathy Pitts, controller for Viking Plastics in Corry, Pa., saw a red flag when one of her suppliers emailed her an update about a shipment on its way to the injection molder of sealing systems.

The message said the supplier had a new bank account and requested that when she paid the attached invoice she should send the money there, and then change her vendor records.

The email addressed Pitts and a company colleague by name but still she was suspicious. She told Viking’s program manager and project engineer, who are familiar with the supplier, about the payment change and they agreed something didn’t seem right.

“Then we got another email,” Pitts told attendees of the Manufacturing Association of Plastic Processor (MAPP) benchmarking conference on Oct. 17 in Indianapolis.

The follow-up message addressed Viking’s specific questions about the order they were awaiting last March.

“They were replying to our email and talking about the logistics of the shipment,” Pitts said. “All right, people change bank accounts every day. No problem. I sent the $10,000.”

She got a thank-you reply in return and an expensive lesson in the cyber crime of spear-fishing, which she shared in a unique way with the 450 people at the conference.

More than telling her story, Pitts wanted to raise awareness about how easy it is to fall prey to criminals who hack into an organization’s computer network to get private information and official-looking emails that they use to bait a virtual trap.

With help from Viking IT manager Rob Prindle and the consent of Troy Nix, MAPP’s executive director, Pitts sent a “spoof” email to 30 MAPP members supposedly from Nix asking for their birthdates.

“Of the 30 people, we got 22 replies. Seventy-three percent of you gave me your birth date. You gave me your personal information,” Pitts said. “Look at the email address. That is not Troy’s email.”

Only one person, Jim Krause, vice president of new program development for Microplastics Inc. in St. Charles, Ill., questioned the email. He contacted the MAPP office and said he thought something was wrong.

Nix applauded the due diligence. He gave Krause $1,000 worth of books and tapes from the keynote speaker, Jack Daly, for doing his homework before replying.

Cyber criminals want birth dates because they are often used as passwords, personal identification numbers, and security questions sometimes ask for it to resend lost passwords. The personal information is valuable to identity thieves and other crooks trying to break into accounts.

In the case of Viking Plastics, the criminals hacked into the supplier’s computer network to find out product shipment details to make their email and bank account request seem authentic.

“They did research on us and took over,” Pitts said.

She later learned a few steps everyone can take when an email comes with a red flag. First, let the cursor hover over the email address to compare it to the information in the pop-up box. They should be the same. Then, click on “file” and then “properties” and look at the “Internet header.”

The bogus email sent to Viking Plastics came from arabdoctors.ae.

“If only I had known to look, I would have seen that,” Pitts said.

She said the most important lesson she learned is to follow your instinct. She now recommends controllers and other finance officials:

• Have a pass code for you and your trusted contacts. It could be a phrase. Something only you know.

• Pick up the telephone and call a contact if you feel an email has a red flag.

• Have dual authorizations on fund transfers.

• Get to know someone in the fraud department of your bank.

“I didn’t think it could happen to me,” Pitts said. “It did. Be careful.”


 
About us
company profile
company culture
version and strategy
company history
certification
patents
contact
News center
company news
industry news
media focus
video
Products
products catalog
technical support
Innovation
create value
production line
QA&QC
new technique info
Copyright:King-Tech China Co.,Ltd
主站蜘蛛池模板: 亚洲一区在线中文字幕| 日韩欧美高清dvd碟片| 国产亚洲精品久久yy50| 粉嫩虎白女p虎白女在线| 蜜臀久久99精品久久久久久| 日本三级韩国三级欧美三级| 一区二区日本午夜| 一区二区视频小说| 国产精品高潮呻吟av久久无吗| 久久亚洲2019中文字幕| av在线一区日韩| 国产日韩成人内射视频| 国产成人 综合 亚洲欧洲| 亚洲另类激情专区小说| 成人乱人乱一区二区三区| 性欧美乱妇高清come| 国产综合无码一区二区辣椒| 成人h动漫精品一区二区三| 国产在线精品无码不卡手机免费| 精品国产精品久久一区免费式 | 七七88色| 久久久久久人妻一区二区电影网| 亚洲视频 一区| 久久人妻夜夜做天天爽| 中文无码日韩欧| 亚洲欧美日韩综合俺去了| 久久av无码精品人妻系列果冻传媒| 色欲视频综合免费天天| 熟妇诱惑一区二区| 久久国产色av免费观看| 国产精品玖玖玖在线| 236宅宅理论片免费| 18禁无遮挡羞羞污污污污免费| 熟妇人妻中文av无码| 色婷婷一区二区三区久久亚洲| 成年女人永久免费观看视频| 丁香婷婷激情综合俺也去| 日韩欧无码一二三区免费不卡| 欧美日本一区二区视频在线观看 | 国产精品一区二区不卡的视频| 人妻熟女αⅴ一区二区三区|