What is Conversation Hijacking and How Could it Affect Me?

by | Aug 13, 2019

Hackers are constantly figuring out new methods of tricking people into believing that their contact efforts are legitimate, while concealing their identities. There is a recently abundant trend dubbed “conversation hijacking.” This is the term used to describe when hackers send an email that is a reply or part of a previously started email chain.

This makes it immeasurably harder to differentiate between suspicious emails and legitimate ones from you contacts list. It is advised that if you receive an email amidst a conversation that urges you to click a link or attend a meeting that seems unusual in any way- do not open it. Instead, start a new email chain and ask the sender if the link did in fact get sent by him/her. Hackers are counting on the fact that most people will not take this step. Another suggestion comes from Todd Smith, Director of Security at Interphase Systems, “Always check for bad spelling or grammar, a lot of phishing can come from abroad where their use of language would be slightly different than your colleague. Also, hover your mouse over the sender details, even if the email seems to be sent from a familiar contact, the details could show you differently.”

Do your employees know how to handle a suspicious or phishing email? More than likely the answer is no- especially when considering the increasing number of skills that hackers have to confuse victims. Do you need a training program to prevent against these types of cyber attacks? We can help. Contact us today and we’ll get the conversation started: 610-276-5500 or fill out our “Contact Us” form.

Could Slack be a Thing of the Past?

Workplaces around the globe have used Slack for interpersonal communications and collaboration since 2014.  However, its biggest competitor, Microsoft Teams, is quickly gaining ground in popularity. Within their recent S-1 filing, Slack highlighted Teams as its...

Be Aware of New Google Calendar Scams

If you think that you can easily decipher phishing emails and other sophisticated scams, you might be wrong. New cyber security research shows that scammers are becoming increasingly sophisticated with their ploys by utilizing the integration between Google Calendar,...

Customer story: Chesterfield County

Watch how Virginia's Chesterfield County Department of Social Services recently transformed its outdated workplace using cloud technology. Using Microsoft Dynamics 365, the department streamlined manual processes and siloed data to improve efficiency and productivity...

Protect your data in files, apps, and devices, within and across an organization

Mobility has become a staple of the modern workplace, offering flexibility to employees and greater productivity to employers. However, this flexibility often requires that employees use their own devices to work when out of office. So how can you protect your data without losing the benefits of “bring your own device?”

Tools such as Azure Active Directory and Microsoft Intune can help you manage access to your data and company networks without invading employee privacy.

At Interphase Systems, Inc., we want you to get the most out of what technology has to offer. Contact us to learn more.

Customer Story: BP deploys Microsoft 365 to improve user experience and security

In an ever-changing security landscape, how do you keep users, devices, and data across 80 countries protected? For BP, they use Windows Defender Advanced Threat Protection that can compile information and identify possible threats more effectively than ever before. So effective in fact, that they put it on all 30,000 Windows 10 devices they have deployed across the world.

And this is just one of the many security tools from Microsoft 365 Enterprise E5 that BP is relying on to remain secure as they continue to transform their company.

You don’t need to be a company the size of BP to take advantage of the same security tools and capabilities BP has implemented to secure the modern workplace.

Are you ready to transform your organization? Interphase Systems has the team, the process and the tools to get you there. Learn more about BP’s security journey in this video, and contact Interphase Systems to help you secure your organization’s information.