国产片淫级awww,成人深夜福利视频,国产伦精品一区二区三区88av,九九精品在线观看,亚洲第一国产精品,九九热精品在线,国产一区二区在线电影

Home About us News center Products Innovation Careers
industry news
company news
industry news
media focus
video
Cyber crime victim raises awareness for MAPP members
 
 

By Catherine Kavanaugh
STAFF REPORTER
Published: October 28, 2014 1:49 pm ET
Updated: October 28, 2014 3:36 pm ET



INDIANAPOLIS — Cathy Pitts, controller for Viking Plastics in Corry, Pa., saw a red flag when one of her suppliers emailed her an update about a shipment on its way to the injection molder of sealing systems.

The message said the supplier had a new bank account and requested that when she paid the attached invoice she should send the money there, and then change her vendor records.

The email addressed Pitts and a company colleague by name but still she was suspicious. She told Viking’s program manager and project engineer, who are familiar with the supplier, about the payment change and they agreed something didn’t seem right.

“Then we got another email,” Pitts told attendees of the Manufacturing Association of Plastic Processor (MAPP) benchmarking conference on Oct. 17 in Indianapolis.

The follow-up message addressed Viking’s specific questions about the order they were awaiting last March.

“They were replying to our email and talking about the logistics of the shipment,” Pitts said. “All right, people change bank accounts every day. No problem. I sent the $10,000.”

She got a thank-you reply in return and an expensive lesson in the cyber crime of spear-fishing, which she shared in a unique way with the 450 people at the conference.

More than telling her story, Pitts wanted to raise awareness about how easy it is to fall prey to criminals who hack into an organization’s computer network to get private information and official-looking emails that they use to bait a virtual trap.

With help from Viking IT manager Rob Prindle and the consent of Troy Nix, MAPP’s executive director, Pitts sent a “spoof” email to 30 MAPP members supposedly from Nix asking for their birthdates.

“Of the 30 people, we got 22 replies. Seventy-three percent of you gave me your birth date. You gave me your personal information,” Pitts said. “Look at the email address. That is not Troy’s email.”

Only one person, Jim Krause, vice president of new program development for Microplastics Inc. in St. Charles, Ill., questioned the email. He contacted the MAPP office and said he thought something was wrong.

Nix applauded the due diligence. He gave Krause $1,000 worth of books and tapes from the keynote speaker, Jack Daly, for doing his homework before replying.

Cyber criminals want birth dates because they are often used as passwords, personal identification numbers, and security questions sometimes ask for it to resend lost passwords. The personal information is valuable to identity thieves and other crooks trying to break into accounts.

In the case of Viking Plastics, the criminals hacked into the supplier’s computer network to find out product shipment details to make their email and bank account request seem authentic.

“They did research on us and took over,” Pitts said.

She later learned a few steps everyone can take when an email comes with a red flag. First, let the cursor hover over the email address to compare it to the information in the pop-up box. They should be the same. Then, click on “file” and then “properties” and look at the “Internet header.”

The bogus email sent to Viking Plastics came from arabdoctors.ae.

“If only I had known to look, I would have seen that,” Pitts said.

She said the most important lesson she learned is to follow your instinct. She now recommends controllers and other finance officials:

• Have a pass code for you and your trusted contacts. It could be a phrase. Something only you know.

• Pick up the telephone and call a contact if you feel an email has a red flag.

• Have dual authorizations on fund transfers.

• Get to know someone in the fraud department of your bank.

“I didn’t think it could happen to me,” Pitts said. “It did. Be careful.”


 
About us
company profile
company culture
version and strategy
company history
certification
patents
contact
News center
company news
industry news
media focus
video
Products
products catalog
technical support
Innovation
create value
production line
QA&QC
new technique info
Copyright:King-Tech China Co.,Ltd
成安县| 泰来县| 池州市| 关岭| 永年县| 利川市| 且末县| 莎车县| 津市市| 分宜县| 二连浩特市| 乐至县| 镇远县| 光山县| 修武县| 中卫市| 保山市| 尉氏县| 财经| 渑池县| 渑池县| 邵武市| 观塘区| 凌源市| 尚义县| 南靖县| 顺义区| 宝鸡市| 吉水县| 本溪市| 巫溪县| 醴陵市| 翼城县| 嵊州市| 皋兰县| 香河县| 军事| 台江县| 汝南县| 禄劝| 乌拉特后旗|