国产片淫级awww,成人深夜福利视频,国产伦精品一区二区三区88av,九九精品在线观看,亚洲第一国产精品,九九热精品在线,国产一区二区在线电影

Home About us News center Products Innovation Careers
industry news
company news
industry news
media focus
video
Cyber crime victim raises awareness for MAPP members
 
 

By Catherine Kavanaugh
STAFF REPORTER
Published: October 28, 2014 1:49 pm ET
Updated: October 28, 2014 3:36 pm ET



INDIANAPOLIS — Cathy Pitts, controller for Viking Plastics in Corry, Pa., saw a red flag when one of her suppliers emailed her an update about a shipment on its way to the injection molder of sealing systems.

The message said the supplier had a new bank account and requested that when she paid the attached invoice she should send the money there, and then change her vendor records.

The email addressed Pitts and a company colleague by name but still she was suspicious. She told Viking’s program manager and project engineer, who are familiar with the supplier, about the payment change and they agreed something didn’t seem right.

“Then we got another email,” Pitts told attendees of the Manufacturing Association of Plastic Processor (MAPP) benchmarking conference on Oct. 17 in Indianapolis.

The follow-up message addressed Viking’s specific questions about the order they were awaiting last March.

“They were replying to our email and talking about the logistics of the shipment,” Pitts said. “All right, people change bank accounts every day. No problem. I sent the $10,000.”

She got a thank-you reply in return and an expensive lesson in the cyber crime of spear-fishing, which she shared in a unique way with the 450 people at the conference.

More than telling her story, Pitts wanted to raise awareness about how easy it is to fall prey to criminals who hack into an organization’s computer network to get private information and official-looking emails that they use to bait a virtual trap.

With help from Viking IT manager Rob Prindle and the consent of Troy Nix, MAPP’s executive director, Pitts sent a “spoof” email to 30 MAPP members supposedly from Nix asking for their birthdates.

“Of the 30 people, we got 22 replies. Seventy-three percent of you gave me your birth date. You gave me your personal information,” Pitts said. “Look at the email address. That is not Troy’s email.”

Only one person, Jim Krause, vice president of new program development for Microplastics Inc. in St. Charles, Ill., questioned the email. He contacted the MAPP office and said he thought something was wrong.

Nix applauded the due diligence. He gave Krause $1,000 worth of books and tapes from the keynote speaker, Jack Daly, for doing his homework before replying.

Cyber criminals want birth dates because they are often used as passwords, personal identification numbers, and security questions sometimes ask for it to resend lost passwords. The personal information is valuable to identity thieves and other crooks trying to break into accounts.

In the case of Viking Plastics, the criminals hacked into the supplier’s computer network to find out product shipment details to make their email and bank account request seem authentic.

“They did research on us and took over,” Pitts said.

She later learned a few steps everyone can take when an email comes with a red flag. First, let the cursor hover over the email address to compare it to the information in the pop-up box. They should be the same. Then, click on “file” and then “properties” and look at the “Internet header.”

The bogus email sent to Viking Plastics came from arabdoctors.ae.

“If only I had known to look, I would have seen that,” Pitts said.

She said the most important lesson she learned is to follow your instinct. She now recommends controllers and other finance officials:

• Have a pass code for you and your trusted contacts. It could be a phrase. Something only you know.

• Pick up the telephone and call a contact if you feel an email has a red flag.

• Have dual authorizations on fund transfers.

• Get to know someone in the fraud department of your bank.

“I didn’t think it could happen to me,” Pitts said. “It did. Be careful.”


 
About us
company profile
company culture
version and strategy
company history
certification
patents
contact
News center
company news
industry news
media focus
video
Products
products catalog
technical support
Innovation
create value
production line
QA&QC
new technique info
Copyright:King-Tech China Co.,Ltd
集安市| 莎车县| 韶关市| 盐源县| 基隆市| 沿河| 获嘉县| 南陵县| 彰武县| 神农架林区| 渭南市| 永安市| 南平市| 浮山县| 翁牛特旗| 牡丹江市| 噶尔县| 新平| 客服| 汤阴县| 淳安县| 剑川县| 平果县| 霍山县| 甘孜| 图们市| 玉溪市| 长岭县| 五峰| 壤塘县| 乐山市| 邵阳市| 桂东县| 青冈县| 连山| 昌邑市| 隆子县| 肇州县| 丰都县| 福建省| 郎溪县|