Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

SCENARIO: The CEO of a boutique hotel realized their business had become the victim of wire fraud when the bookkeeper began to receive insufficient fund

SCENARIO:
The CEO of a boutique hotel realized their business had become the victim of wire fraud when the
bookkeeper began to receive insufficient fund notifications for regularly recurring bills. A review of the
accounting records exposed a serious problem. At some point a few weeks before, the CEO had clicked on
a link in an email that they thought was from the IRS. It wasnt. When they clicked the link and entered their
credentials, the cyber criminals captured the CEOs login information, giving them full access to intimate
business and personal details.
ATTACK:
Social engineering, phishing attack.
A phishing attack is a form of social engineering by which cyber criminals attempt to trick individuals by creating and sending fake emails that appear to be
from an authentic source, such as a business or colleague. The email might ask you to confirm personal account information such as a password or prompt
you to open a malicious attachment that infects your computer with malware.
RESPONSE:
The hotels cash reserves were depleted. The fraudulent transfers amounted to more than $1 million. The
hotel also contacted a cybersecurity firm to help them mitigate the risk of a repeat attack.
IMPACT:
The business lost $1 million to an account in China. The funds were not recovered.
LESSONS LEARNED:
1 Teach staff about the dangers of clicking on unsolicited email links and attachments, and
the need to stay alert for warning signs of fraudulent emails. Engage in regular email
security training.
2 Implement stringent wire transfer protocols and include a secondary form of validation.
3 Have a cyber incident response plan ready to implement!
DISCUSS:
Knowing how the firm responded, what would you have done differently?
What are some steps you think the firm could have taken to prevent this incident?
Is your business susceptible to this kind of attack? How are you going to reduce your risk?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Informix Database Administrators Survival Guide

Authors: Joe Lumbley

1st Edition

0131243144, 978-0131243149

More Books

Students also viewed these Databases questions