2024 Aurora Issue November | Page 4

Phishing and Smishing
WELCOME

Letter from the Chairman

PAUL THOMAS | CHAIRMAN OF THE BOARD

Phishing and Smishing

As a Board , we have seen a significant increase in Scam attempts through email and text messages . In today ’ s digital age , board members are increasingly becoming targets for phishing scams , particularly through text messages ( smishing ) and emails . As leaders within their organizations , board members often have access to sensitive information and decision-making power , making them attractive targets for cybercriminals . This can also affect our business , targeting upper-level managers , staff , accountants , and even spouses . I encourage you to familiarize yourselves with the common signs of phishing and smishing scams , such as :

• Unusual Email Addresses : Check for slight misspellings in email addresses that mimic legitimate sources . Often , our mail servers might even hide the actual address behind a display name of the person we trust or that person ’ s actual email to make the message look legitimate .

AS CYBER THREATS EVOLVE , THE
• Texts that start a new text string and come from an address or phone number that doesn ’ t match your known contact .
• Urgent Language : Be wary of messages that pressure immediate action , such as urgent fund transfers or password changes .
RESPONSIBILITY TO SAFEGUARD SENSITIVE INFORMATION FALLS HEAVILY ON BOARD MEMBERS AND BUSINESS LEADERS
• Unsolicited Requests : Skepticism is advised regarding unexpected requests for sensitive information , even if they appear to come from trusted colleagues .
• Of course , never use a link inside a suspected email or text message .
Beyond the immediate threat of financial loss , a breach could compromise confidential information or damage the trust we have built with our customers , depending on the information lost to the scammer . Additionally , the legal repercussions of such incidents can be daunting , further straining an organization ’ s resources .
Educate key members to always verify requests for sensitive information before acting or responding to a questionable message through a separate communication channel , and never hesitate to reach out if something feels off . It is crucial to foster an environment where members feel comfortable reporting suspicious communications before acting without fear of judgment .
As cyber threats evolve , the responsibility to safeguard sensitive information falls heavily on board members and business leaders . By recognizing the risks and implementing robust security measures , they can protect themselves and their organizations from the pervasive threat of phishing scams . In an era where digital interactions are commonplace , vigilance and proactive defense are key to our business ’ s safety .
ALASKA CHARR MAGAZINE | 2