- cross-posted to:
- [email protected]
- [email protected]
- cross-posted to:
- [email protected]
- [email protected]
they have been demoted to a bccountant
Good on them for catching it early and handling it properly, but I’d be firing that accounting firm.
Weird that antifishing training isn’t a normal requirement for people working with sensitive information.
Even if they take the training it’s often not regularly, not enforced, and generally encouraged to ignore.
It is unfortunate. The company I work for enrols all employees in training that takes place every month or so (regardless of your role). They also send out fake phishing emails every so often, and those who interact with them are automatically enrolled in additional training. Stats are anonymous, but apparently interactions with those fake phishing emails have drastically reduced. Training absolutely helps, but it needs to be consistent to keep security on everyone’s mind.
This is exactly the case. It’s not continuous training. It’s often one time training at hire then never mentioned again until something happens, like this.
https://youtube.com/shorts/VAWwtjtRM98?si=bBJlan5KAI7ihwlO
Phishing and Social Engineering attacks can target anyone in a company. Everyone needs consistent training to keep it in their mind and not become complacent.
I changed my password before actually reading the article:
On January 11th at 8:13am PST, the accountant responded to the attacker and provided a spreadsheet with the following information: Full Name, Email Address, Balance Owed.
[…]
As part of a subsequent investigation, the company identified all customers whose information was exposed in the attack and notified them of the incident via email.
So if I didn’t get an email I’m good? Because I didn’t get an email.
This is something I would like to know as well. I have an open preorder at the minute and haven’t received anything. These articles are how I found out. Best practice for now is to change your password and pay attention to the payment method on file for unauthorized transactions
Same. At least I use unique passwords.
Learned from one of their more vocal investors
Bruh