FIN7 Redefining Hospitality

Three Ukrainian nationals have been indicted by the Justice Department for their alleged participation with FIN7 hacking group, an international crime cooperative that has used phishing scams to capture credit card numbers from thousands of American businesses. And that’s just the United States and just the beginning. As outlined in the indictments reported in a recent Wired article, FIN7 penetrated the networks of restaurants and hotel chains with unassuming phishing emails requesting services or lodging complaints that obviously seemed credible to recipients. The cascading phishing strategy enabled hackers to get further behind the walls and into sensitive customer information, including credit card numbers. And in all cases it began with a single email to a single employee who opened a single attachment.

The Human Simplicity Of Cybercrime

The growing number of bots excluded, we are all human and as we tread the paths of this Internet, we are all vulnerable. We make mistakes, we have bad days, we get caught up in frenzied activity and lose sight of the new adage, “Don’t open attachments from strangers.” The question is not whether someone on your staff will make this mistake, it is simply when they will make it. And that’s just one way the bad guys get a foot in the door.

A Simple Solution For Cybersecurity

If you think a simple solution exists, let’s saddle up the unicorns and ride the rainbow to the pot of gold. The mistakes are simple, but the repairs to networks, data, and business reputations are increasingly complex. Cybercrime is like the plague. It’s best avoided.

And how is it best avoided? With the help of ICS and our network of professionals who professionally test your network for vulnerabilities and develop strategies to keep your business humming through all sorts of chaos. The answers are complex. The call is simple, though.

ISO 9001 2015Technology Industry InnovatorsVeteran Owned Small BusinessCMMI Maturity Level 3CISSP® - Certified Information Systems Security ProfessionalCertified Penetration TesterITIL IT Service ManagementCertified Ethical HackerProject Management Institute CertifiedUS Department of Homeland SecurityDisaster Recovery Institute CertifiedCertified Information Systems Auditor