facebook linkedin twitter

Computerware Blog

When Your Contacts Aren’t Your Contacts - Display Name Spoofing

When Your Contacts Aren’t Your Contacts - Display Name Spoofing

Business success is often tied to the quality of your business relationships. There are a lot of people you need to trust: your vendors to get you whatever supplies you need, your team to complete their responsibilities without letting in threats, and your customers to turn to you for what they need. Unfortunately, cybercriminals are willing to take advantage of such trust to accomplish their own ends.

A cybercriminal really couldn’t care less how much trust you share with your many contacts unless they can use that trust to their advantage. That’s why phishing scams exist, and why a particular approach to them—display name spoofing—can be particularly effective.

Let’s go over what display name spoofing is, and how to prevent it from infiltrating your business.

Understanding Display Name Spoofing

Display name spoofing is a tactic that many hackers will include in their phishing attacks. Phishing is a scam where a cybercriminal will reach out, posing as someone else or as an organization, to subvert your security by manipulating someone in your business. By spoofing their display name, these attacks are made even more effective. Let’s break down how display name spoofing works.

Email signatures are common in the business world, which gives cybercriminals who use display name spoofing an advantage. Once the cybercriminal selects their target, they intently research that target to find someone who might be able to influence their behaviors and then target them posing as that someone.

As a result, display name spoofing could look something like this:

Looking closely, the only sign that something here is questionable is the email address… and considering that some email clients don’t show the full address by default, many employees may not even consider that an email isn’t legitimate.

How to Fight Back Against Display Name Spoofing

Consider the kinds of security you should have implemented around your business. You lock the doors, you may have security cameras, and you should have some access control policies to make sure that your employees can use the resources they need to do their jobs. Similar security measures should be put in place to protect your digital assets as well.

To do so effectively, you need to have a strategy in place that acknowledges the hard reality that your business will be faced with a phishing attack. As a crucial part of this, your team needs to be trained so they are ready to spot these attacks and respond accordingly.

Here are a few ways you can gauge whether a message can be trusted or not:

  • Thoroughly inspect both the name and sender’s email address before you act.
  • Check the content for misspellings or completely incorrect uses of grammar.
  • Consider if the sender would send a message asking you to take cavalier action.
  • Consider if the sender would ask you to send them authorization credentials through email.

If one of your team members ever doubts the veracity of an email they receive, you need to be sure that they know to—and how to—properly verify it. Doing so generally takes minutes and can significantly reduce the risks that display name spoofing presents.

For more assistance in identifying cybersecurity threats and training your team how to respond as they should, reach out to Computerware. Give our professionals a call at (703) 821-8200.

The Four Corners Your Network Security Needs to Co...
Taking a Look at Some Innovative Smartphones


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, December 03, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Hardware Workplace Tips Network Security Microsoft Backup Productivity Business Email Managed Service Provider Hosted Solutions Productivity Malware Saving Money IT Services Efficiency Google Innovation Small Business Computer User Tips Collaboration IT Support VoIP Quick Tips Smartphones Data Backup IT Support Network communications Mobile Devices Business Continuity Data Recovery Microsoft Office Disaster Recovery Gadgets Android Cybersecurity Social Media Upgrade Phishing Smartphone Mobile Office Communication Server Virtualization Miscellaneous Mobile Device Mobile Device Management Windows Ransomware Passwords Users Vendor Management Holiday Operating System Managed IT Services Windows 10 Apps Tech Term Outsourced IT BDR Internet of Things Facebook Remote Monitoring Unified Threat Management BYOD Automation Analytics Managed IT services Data Management Mobile Computing Remote Computing Apple WiFi Windows 10 Browser Save Money Training Help Desk Marketing History Artificial Intelligence Managed Service Cloud Computing The Internet of Things Firewall Covid-19 Business Technology Encryption Alert Big data App Spam Health IT Consultant Office Office 365 Budget Two-factor Authentication Information Technology Bandwidth Managed IT Cybercrime Bring Your Own Device VPN Antivirus Maintenance Access Control Printer Content Filtering Windows 7 Gmail Blockchain Going Green Information Hard Drives Government Recovery Employer-Employee Relationship Computers Healthcare Saving Time Retail Wireless Technology Outlook Cost Management Windows 8 Networking Search Remote Work Virus Tech Support Lithium-ion Battery Best Practice Wi-Fi Document Management Hiring/Firing Phone System Augmented Reality Travel Project Management Education Hacking Update Conferencing Humor Computing iPhone It Management Customer Service Data Security Money IBM Storage Data Loss Customer Relationship Management Computer Repair Running Cable Compliance Proactive IT Solid State Drive Data storage Current Events Data Breach Flexibility PowerPoint Voice over Internet Protocol Twitter Laptop Password Intranet Value Administration File Sharing Hard Drive Legal Hacker Applications Regulations Mobility Risk Management Avoiding Downtime Vendor Save Time SaaS Downtime End of Support Wireless Law Enforcement Patch Management Website Machine Learning Scam Telephone Systems Vulnerabilities Social Networking Word Black Market Cryptocurrency Cortana Digital Websites Business Growth Fax Server Google Maps Employee/Employer Relationship Software as a Service Social Engineering Net Neutrality Paperless Office Business Intelligence Sports Chrome User Cooperation Virtual Desktop Digital Payment Disaster Router Social Monitoring Meetings Hosted Solution Private Cloud Robot Securty DDoS Excel Comparison Tablet Company Culture Management Remote Telephony Telephone Employees Microchip Taxes Mouse Professional Services Distributed Denial of Service Bluetooth Redundancy Smart Devices User Error Integration Gaming Console Programming Co-managed IT Statistics Video Conferencing Public Cloud Licensing Network Congestion eWaste Evernote Google Docs Text Messaging Memory Virtual Assistant Webcam Identity Theft Managed Services Provider Experience Streaming Media Monitors Display Notifications Cleaning Start Menu Tech Terms Lifestyle Office Tips Processors Mobile Technology Distribution How To Virtual Reality USB Managed Services Politics Automobile YouTube Managed IT Service Emails Inbound Marketing Presentation Uninterrupted Power Supply Cost Chromebook Unified Communications Settings Vulnerability Safety Computing Infrastructure Hack Bitcoin Specifications How To Pain Points Processor Data Protection Documents Download Computer Accessories Entertainment Downloads Teamwork IT service Heating/Cooling Multi-factor Authentication Solutions Trending eCommerce Worker Upgrades PDF Assessment SharePoint Wireless Headphones Data Analysis FinTech Video Surveillance Migration Connected Devices Development Skype Google Calendar Equifax Fleet Tracking Printers Data Storage SQL Server Archive LiFi Best Available Keyboard Tip of the week Network Management GDPR Managing Risk Reading Samsung Saving ZTime Device security MSP Procurement G Suite Touchscreen News Tech Reviews Hypervisor Employer Employee Relationship Domains VoIP Holidays Harddrive Point of Contact Deep Learning Consultation Webinar Nanotechnology Social Network Fileless Malware Organization Hybrid Cloud Hacks Physical Security Debate Work/Life Balance Public Speaking Knowledge Desktop Finance Technology Tips Startup Asset Tracking Proxy Server PCI DSS Azure Banking Botnet GPS Visible Light Communication Shortcut Business Cards Service Level Agreement Communitications Modem Strategy Relocation Tablets Audit Username Electronic Medical Records Supply Chain Management Transportation Sync IT consulting Entrepreneur Fake News Unified Threat Management Backup and Disaster Recovery Term External Harddrive Troubleshooting Internet Service Provider Recording Optimization Analytic Environment Data Warehousing Screen Reader Customer Resource management Directions AI CCTV Recycling HIPAA Gamification Thin CLient Product Reviews CIO Electronic Payment Access Smart Tech Dark Web Regulations Compliance Free Resource Business Metrics Computer Malfunction 3D Ebay Advertising Flash Competition Emergency Hard Drive Disposal Piracy Upload IT Assessment SSID Reliable Computing Computer Care Best Practives HTML Health IT Remote Working In Internet of Things Read Windows XP Microsoft Excel Fiber-Optic Database Processing Smart Phones Staffing Google Wallet Business Owner Logistics Virtual Machines Displays Google Drive Windows Server 2008 Telephone System Supply Chains Wasting Time Society IP Address Mobile Security Leadership Micrsooft Human Resources Spyware Mobile Payment Multi-Factor Security Bookmark Financial Data Motion Sickness Adminstration Pirating Information Device Management Application Microserver Software License Trends Electronic Health Records Cyber security Scalability Electricity Printing Devices Employer/Employee Relationships Content Management Fraud Tactics Memes Google Play Telephone Service Messenger Tracking Business Managemenet Drones UTM Content Managing IT Services Microsoft 365 2FA Managing Costs Rental Service Get More Done Cabling cache Television Printer Server Legislation Error Browsers Telework Web Server online Currency Permissions Digital Signature Language Turn Key IT Plan Enterprise Resource Planning Surveillance Medical IT Trend Micro WannaCry Trojan Accountants A.I. User Tip Remote Workers Proactive Maintenance Administrator email scam Addiction IT Security Cameras Threats Books Workers Virtual Private Network Upselling switches Writing Time Management Freedom of Information Organize Navigation Virtual Machine Supercomputer LinkedIn Music Corporate Profile CrashOverride Capital 3D Printing Productuvuty Managing Stress Personal Information Regulation Financial