Paradise Computer Services
paradisecomputer@comcast.net

CALL US! 941-493-5126

Address: 1832 Tamiami Trail South, Unit B, Venice, FL 34293 

How $43,000 Got Stolen from a Small Business in The Blink of an Eye?

Daniel Bracho • Mar 29, 2024

How $43,000 Got Stolen from a Small Business in The Blink of an Eye?

This is a subtitle for your new post

Imagine glancing down at your phone on a normal Friday night after a long week of work and seeing an alert from your bank. You open it to find that you’ve just paid a company you’ve never heard of $43,000!


This was an all-too-real situation for one small business owner a few weeks ago – and there’s NOTHING the owner, police, or anyone else can do to get that money back. It’s gone forever.


Thankfully, this company's $43,000 loss was a loss they could absorb, but it was still a huge hit, and frankly, they are lucky they weren’t taken for more.


Here’s what happened and how you can keep this from happening to you.


The E-mail that Started it all

Imagine receiving an e-mail so convincing, so utterly devoid of red flags, that you find yourself compelled to act. This isn’t a failure of judgment; it’s a testament to the sophistication of modern cyber threats.


In this case, an employee in the accounting department received an e-mail from the company’s “CEO” saying they were starting to work with a new company and needed to get them set up in the system and make a payment to them right away.


This was NOT an abnormal type of e-mail, nor was the amount anything that aroused suspicion – they made and received large amounts of money often.


The only telltale clue might have been that it came in on a Friday afternoon, and it was made clear that it was an urgent matter that had to be handled immediately.


The employee, thinking they were doing exactly what their boss wanted, set up the attacker’s company in the system, including their bank routing number, and made a payment. The minute they hit “Send,” the money was never to be seen again.


It wasn’t until the CEO called minutes later, after receiving notification of the transfer, that alarm bells started to ring! But by then, it was all too late.


So, what Happened?


While it’s impossible to know what exactly triggered this chain of events, the most likely culprit is that an employee, possibly even the owner, received an e-mail sent by a cybercriminal weeks or even months earlier that allowed this person to gain access to some of the company’s systems.


Likely, the e-mail looked normal and had a link that, when clicked, downloaded software onto the recipient’s computer, and that’s where things started to go wrong.


Over the following weeks, cybercriminals accessed company communications and discovered the players' identities. They devised a plan to make it look like the CEO needed a vendor to be paid urgently.


And when the criminals determined the time was right, they “attacked” and walked away with $43,000 for their efforts.


Home Alone

While this scenario may sound far-fetched, it’s not new.


If you remember seeing the classic movie Home Alone, would-be thieves watched houses immediately preceding Christmas to determine which families would be away for the holidays so they could break into those homes.


Cybercriminals do the same thing, but from a distance, and you’d never know they were ever there.

The scary fact is that your system could be compromised right now, and you would have no way of knowing it until an attack happens.


In the cybercrime world, the kind of attack this company suffered is spear phishing. Criminals identify a single point or person in an organization who they believe could fall victim to a scam like the one that happened here. They engineer a scheme to target them specifically.


What You and Your Employees Need to Know to Help Thwart Attacks


The sad fact is that there is no 100% safeguard against cybercriminals. But like our robbers in Home Alone, cybercriminals go after the low-hanging fruit. If your house has a gated entry, security system, outside cameras and lights, and three vicious-looking dogs roaming around, would-be thieves are much more likely to move on to a house without all these layers of security.


Cybercriminals operate similarly, looking for companies that aren’t protected and then targeting them specifically. So, the best thing you can do is have layers of protection for your company and education for your employees.


3 Things to Do Right Now to Protect Your Company


  1. Multi-factor authentication (MFA), also called two-factor authentication (2FA), is not just a tool but also a shield against the relentless barrage of cyber threats. An example of MFA is when you try to log into a program, and it sends a code to your cell phone via text that needs to be entered before granting access to the program. While often deemed a nuisance, MFA isn’t an inconvenience – it’s the digital equivalent of locking your doors at night. It’s a simple yet effective measure differentiating between a secure business and a cautionary tale.
  2. Employees are your first line of defense. Just like you’d teach your kids not to open the door for someone they don’t know, you NEED to educate your employees on malicious threats. It is key to teach them about the common scams, how to avoid them, and what to do if they think they’ve inadvertently clicked a link they shouldn’t have. You need to ask your IT company to provide this training, and often, they have programs that you can require your employees to go through a couple of times a year. The program then quizzes them to ensure they know. While this process isn’t something you or they will look forward to, the reality is that it could take just 10 to 15 minutes a couple of times a year to keep you out of the news and your money out of someone else’s account!
  3. Get cyber security services in place. MFA is just the start of a comprehensive security plan. You need to talk to a qualified company (not your Uncle Larry, who helps you on the side) about getting more than a firewall and virus scan software. What worked a decade or two ago – and may still be helpful on a home network – would be like protecting a bank vault with a ring camera. It’s just not going to cut it. NOTE: We offer various security services for companies of all sizes and can talk to you about options that suit your situation.


Whatever You Do, Don’t Do This!!!


Maybe the worst thing the owner of the company that lost $43,000 did was they then posted a video and story on social media.

While their intentions were good because they wanted to warn other business owners not to fall victim to the same scam, they might as well have had T-shirts made with a big target on the back.

It’d be like having cash taken from your house, then going online and telling people exactly how it happened—you’d just be inviting more people to try to take your cash.


Not Sure If you’re as Protected and Prepared as you should be?


To ensure proper protection, get a FREE, no-obligation Cyber Security Risk Assessment. During this assessment, we’ll review your entire system, so you know exactly if and where you’re vulnerable to an attack.


You can schedule your assessment with one of our senior advisors by calling us at 941-493-5126 or clicking here.

Money -- Scam --  IT Solution -- IT Services -- IT -- Venice, FL -- Paradise Computer Services
By Daniel Bracho 10 May, 2024
Horror stories of people getting scammed out of hundreds or even thousands of dollars aren’t in short supply. As we scroll through the news app from the comfort of our couch, reading these accounts of how a stupid so-and-so opened a suspicious attachment and a hacker drained their bank account, it’s easy to say things like, “I’d never fall for that!” But would you?
Jetty -- Beach --  IT Solution -- IT Services -- IT -- Venice, FL -- Paradise Computer Services
By Daniel Bracho 04 May, 2024
We rely on technology to run our businesses and lives now more than ever. When the “Internet goes down,” most companies come to a standstill until they are back online, costing thousands in lost productivity and sales. A perfect example would be the AT&T outage a few weeks ago, when an estimated 1.7 million customers, including small business owners, lost service. No phones, no Internet. Could you afford your business to be down for minutes, hours, or even days? The answer is likely no.
Email -- Phishing -- IT Solution -- IT Services -- IT -- Venice, FL -- Paradise Computer Services
By Daniel Bracho 26 Apr, 2024
In today's digital world, phishing emails have become one of the most common methods cybercriminals use to trick individuals and businesses into revealing sensitive information or installing malware. As an IT customer, educating yourself and your team on how to detect phishing emails to safeguard your business from potential threats is crucial. In this article, we'll explain how to spot a phishing email and explore how MSP solutions can help protect your business from cyber threats without selling you unnecessary products or services.
Idea --IT Problem -- IT Solution -- IT Services -- IT -- Venice, FL -- Paradise Computer Services
By Daniel Bracho 19 Apr, 2024
In today's digital age, small-medium businesses (SMBs) face many challenges when managing their IT infrastructure. From cybersecurity threats to software updates and technical glitches, the world of technology can sometimes feel like a maze. That's where IT Managed Services Providers (MSPs) come into play, serving as the guiding light that helps SMBs navigate the complexities of IT management. In this article, we'll break down what an IT-managed services provider is and how it can support SMBs daily, all while emphasizing the importance of having local representation. So, What is an IT Managed Services Provider?
IT Problem -- IT Solution -- Cyber Pirates -- IT -- Venice, FL -- Paradise Computer Services
By Daniel Bracho 13 Apr, 2024
When properly utilized, technology can provide a strategic advantage for companies in every industry. However, one of small business owners' biggest issues is overcoming common tech obstacles that hinder productivity. These issues range from minor inconveniences to serious threats that permanently shut down a business. In today’s blog, we’ve outlined 6 of the most common technology problems small business owners face regularly and how you can either avoid or resolve them. 1. Failing to Meet Industry-Specific Compliance Requirements 2. Lack of Strategic IT Planning 3. Inadequate Cyber Security Protection 4. Poor User Support 5. Poor User Asset Management 6. Lack of Training
User -- Piracy -- Cyber Pirates -- IT -- Venice, FL -- Paradise Computer Services -- Passwords
By Daniel Bracho 06 Apr, 2024
“Know Ye That We Have Granted and Given License to Adam Robernolt and William le Sauvage…to annoy our enemies by sea or by land, wheresoever they can, so that they share with us the half of all their gain.” These were the words of King Henry III of England as he issued one of the first letters of marque, effectively employing private sailors to bolster his naval power and fill the royal coffers, all under the guise of lawful privateering. This clever maneuver financed the kingdom’s ambitions and paved the way for the discovery and plunder of new worlds, all at the expense of England’s adversaries.
User -- Laptop -- Username  -- IT -- Venice, FL -- Paradise Computer Services -- Passwords -- Change
By Daniel Bracho 23 Mar, 2024
I get it—it's already passed, but each year, on February 1st, we celebrate Change Your Password Day. While it’s not a holiday that gets you off work, it is a good opportunity each year to do a quick check-in and ensure you’re using strong passwords to protect your accounts. Does not matter if it already passed; you can always have a belated celebration! The suggested ‘rule’ used to be to change your password every three months. With advanced tools like password managers and data encryption, experts now say the type of password you use is more important than how often you create a new one. We’re sharing up-to-date advice on how to make a strong password that will keep your account secure and hackers guessing.
PC -- Laptop -- Android -- Apple Phone-- IT -- Venice, FL -- Paradise Computer Services -- Servers
By Daniel Bracho 16 Mar, 2024
Gone are the days when phones were simple devices used to make calls. Today, our phones are advanced, handheld supercomputers that can do everything from paying a bill to ordering lunch for delivery, editing videos, and more. But with more capabilities come more risks. Because our phones are computers connected to the Internet, they are susceptible to the same security risks as any other computer. Worse yet, personal devices often contain private information like bank account numbers, which, if accessed by the wrong person, could result in dangerous and expensive problems like drained bank accounts, identity theft, etc. Still, despite the obvious risks, most people do not treat phones like the security threats they pose, making them easy, no-brainer targets for cybercriminals.
Top -- Top 5 -- Service -- IT -- Venice, FL -- Paradise Computer Repair & Services -- Servers
By Daniel Bracho 09 Mar, 2024
The year 2023 marked a significant turning point for cyber-attacks with the introduction and wide proliferation of AI (artificial intelligence). AI is now in the hands of people who wish to do you harm and who are actively using it to find faster and easier ways to rob you, extort you, or burn your business to the ground. As we write this, we know there’s a tendency to shrug and accept the “we’re all going to get hacked anyway” mantra to avoid dealing with it. Further, like overhyped weather reports, it’s also tempting to ignore the warning signs, thinking all this is just fearmongering rhetoric designed to sell stuff.
attacker -- cybercriminal --cybersecurite -- username -- password --paradisecomputer
By Daniel Bracho 02 Mar, 2024
Have you ever searched for a specific website but landed on a completely different one after misspelling a letter or two in the URL? This deceptive tactic is known as cybersquatting. This practice not only jeopardizes the online presence of businesses and individuals but also poses a significant challenge in the ever-evolving landscape of cyber security. The scariest part is that you can be a victim of a cybersquatting domain and not even realize it.
More Posts
Share by: