About IT Blog
This site has been setup to help anyone in business find the right answers for their IT & Communications. It is not about hardcore IT articles, this CPU, that Hard Drive it is about finding the solution for your business and maybe even help with the design and implementation.
We aim to provide useful articles, advice and information to assist in working out where your business needs to be with Information Technology & Communications in the workplace.
Topics that we hope to cover in the coming months will be, General IT, Cloud, Mobile Devices, Telephony, Communications, Software, Business Process and many more topics that you need to assist in developing your business.
I look forward to you coming along with us on this journey...
Visit Sister Site
Territory Technology Solutions Arafura Connect Connected Office Connected Phone CCTV CloudSpear-Phishing
- Published 24/01/2018
It is amazing to see the terms that are defined for different types of attack as below.

A more targeted form of phishing is known as ‘spear-phishing’. Rather than emailing many people at once, these emails are more targeted and are usually only sent to one person, and made to look like it’s from someone you know, and that the topic is relevant to you.
Spear-phishing is used to target employees by impersonating senior executives asking for funds transfers. This is also known as ‘wire fraud’.
They usually ask the target to make a wire funds transfer for them- or confidential information (eg tax details). By making the email appear to come from a very senior person, they are hoping you’ll action it quickly without verifying the request.
In recent weeks through our Helpdesk we have seen a huge increase in very personalised emails for smaller amounts of money targeting small companies.
Many businesses have lost large amounts of money due to spear-phishing- eg Irish airline, Ryanair, lost $5 million to this type of scam.
Raising awareness of these scam emails with employees (especially Personal Assistants or payment authorisers) is important to reduce this risk. If you receive a request like this, simply call the person (on a known number) to confirm they requested the transfer.















