{"id":10319,"date":"2016-03-07T12:09:17","date_gmt":"2016-03-07T01:09:17","guid":{"rendered":"https:\/\/smithink.stackedsite.com\/?p=10319"},"modified":"2019-05-31T13:19:29","modified_gmt":"2019-05-31T03:19:29","slug":"lessons-from-the-hackers","status":"publish","type":"post","link":"https:\/\/smithink.com\/2016\/03\/07\/lessons-from-the-hackers\/","title":{"rendered":"Lessons from the hackers"},"content":{"rendered":"

Well it had to happen. We were caught by one of those vicious phishing attacks. A simple click on a malicious email set it all in motion. Easy to do but with somewhat dire consequences. It allowed access to the particular email account. Messages and contacts deleted and the malicious email sent to the contacts in that account. It all could have been avoided with some simple measures. I\u2019ll come to that later.<\/p>\n

You see we\u2019re a virtual business – no office (everyone works from home) and everything in the cloud. It\u2019s highly efficient and cost effective. From an IT perspective, however, it\u2019s a bit more difficult to manage as each team member has their own computing environment. I blame myself. I should have been more vigilant and insisted on higher security measures (which I had already implemented in my own home office IT set-up).<\/p>\n

At the end of the experience I received a number of emails congratulating us on how we dealt with the episode, and suggesting that we should write about it. So here\u2019s the article!<\/p>\n

What we did wrong<\/strong><\/p>\n

    \n
  1. I had failed to insist on two factor authentication for all of our team and for all our applications that has two factor authentication enabled. Two factor authentication works like internet banking. To login you need a username and password and the system then sends a code to your phone. This means that without your phone your account can\u2019t be accessed. Of course the concept can be annoying so you can set it to remember devices that you\u2019ve authenticated so that it only send the code occasionally when that device is used. What it means though is that any new device that tries to access your account can\u2019t do so without the code sent to your phone. Remote access by a hacker can\u2019t occur (unless they\u2019ve nicked your phone or found a way to change the phone number).<\/li>\n
  2. I had failed to check that each team member had a high quality anti-virus\/malicious software scanner installed that also checks email attachments before they\u2019re opened. The machine concerned was an Apple Mac where the user thought that Apple was immune from such attacks. Readers may be aware of my preference for non Apple devices but perhaps that\u2019s a subject for another day!<\/li>\n
  3. I had failed to provide any training as to what to look for. These days I am suspicious of virtually every email attachment or link. Before opening I firstly look at the sender\u2019s email address to ensure it\u2019s legit. If it\u2019s link I hover over it to see where it\u2019s going to. Be mindful that some malicious emails use tinyurl or similar url shortening utilities to hide where the link actually goes.<\/li>\n<\/ol>\n

    What we did right <\/strong><\/p>\n

      \n
    1. Despite being 100% in the cloud, we still have backups. We use Google Apps for Business. In addition we use another service (Backupify) which for a few dollars each month backs up our entire Google Apps data every night. Recovery was as simple as just a few clicks.<\/li>\n
    2. We communicated. As quickly as we could we sent out an email to anyone who we thought may have received the malicious email from us to warn them of the possibility. The only improvement we could have made is that we could have worded that email better but at the time we just wanted to get the notice out as quickly as possible.The next morning, after we ascertained who would have received the malicious email we sent out a well worded apology to that group and fielded calls and helped people who had any concerns.\n

      While some people were understandably upset, most were very understanding and quite a few congratulated us on how we dealt with it.<\/li>\n<\/ol>\n

      Of course we had a number of the cloud hosting providers who were proactive in letting us know that if we were on their platform such an event wouldn\u2019t have happened due to the tight way they lock down their platforms. That of course is true but it comes at a cost which is not warranted for a business of our size and the applications we use. For most professional service firms, however, such platforms should be considered for a wide variety of reasons including security.<\/p>\n

      So in addition to wasting a day or so and giving me some additional grey hair we have learnt some valuable lessons. I hope that this note will help you avoid similar trauma.<\/p>\n

      Do you receive our monthly newsletter? If not, enter your name here<\/a> and be the first to receive our monthly updates on the accounting industry.<\/p>\n","protected":false},"excerpt":{"rendered":"

      Well it had to happen. We were caught by one of those vicious phishing attacks. A simple click on a malicious email set it all in motion. Easy to do but with somewhat dire consequences. It allowed access to the particular email account. Messages and contacts deleted and the malicious email sent to the contacts…<\/p>\n","protected":false},"author":854,"featured_media":10320,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"\nLessons from the hackers - Smithink<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/smithink.com\/2016\/03\/07\/lessons-from-the-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lessons from the hackers - Smithink\" \/>\n<meta property=\"og:description\" content=\"Well it had to happen. We were caught by one of those vicious phishing attacks. A simple click on a malicious email set it all in motion. Easy to do but with somewhat dire consequences. It allowed access to the particular email account. Messages and contacts deleted and the malicious email sent to the contacts…\" \/>\n<meta property=\"og:url\" content=\"https:\/\/smithink.com\/2016\/03\/07\/lessons-from-the-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Smithink\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-07T01:09:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-31T03:19:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/smithink.com\/wp-content\/uploads\/sites\/478\/2019\/05\/Lessons-from-the-hackers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"480\" \/>\n\t<meta property=\"og:image:height\" content=\"317\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"marvin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"marvin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/smithink.com\/2016\/03\/07\/lessons-from-the-hackers\/\",\"url\":\"https:\/\/smithink.com\/2016\/03\/07\/lessons-from-the-hackers\/\",\"name\":\"Lessons from the hackers - Smithink\",\"isPartOf\":{\"@id\":\"https:\/\/smithink.com\/#website\"},\"datePublished\":\"2016-03-07T01:09:17+00:00\",\"dateModified\":\"2019-05-31T03:19:29+00:00\",\"author\":{\"@id\":\"https:\/\/smithink.com\/#\/schema\/person\/03caa179bd15e4165688fcb8757cd9f3\"},\"breadcrumb\":{\"@id\":\"https:\/\/smithink.com\/2016\/03\/07\/lessons-from-the-hackers\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/smithink.com\/2016\/03\/07\/lessons-from-the-hackers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/smithink.com\/2016\/03\/07\/lessons-from-the-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/smithink.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lessons from the hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/smithink.com\/#website\",\"url\":\"https:\/\/smithink.com\/\",\"name\":\"Smithink\",\"description\":\"Experience delivers the how\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/smithink.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/smithink.com\/#\/schema\/person\/03caa179bd15e4165688fcb8757cd9f3\",\"name\":\"marvin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/smithink.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/dea7335c8ba69364fc85b1b30c77022b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/dea7335c8ba69364fc85b1b30c77022b?s=96&d=mm&r=g\",\"caption\":\"marvin\"},\"url\":\"https:\/\/smithink.com\/author\/marvin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lessons from the hackers - Smithink","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/smithink.com\/2016\/03\/07\/lessons-from-the-hackers\/","og_locale":"en_US","og_type":"article","og_title":"Lessons from the hackers - Smithink","og_description":"Well it had to happen. We were caught by one of those vicious phishing attacks. A simple click on a malicious email set it all in motion. Easy to do but with somewhat dire consequences. It allowed access to the particular email account. Messages and contacts deleted and the malicious email sent to the contacts…","og_url":"https:\/\/smithink.com\/2016\/03\/07\/lessons-from-the-hackers\/","og_site_name":"Smithink","article_published_time":"2016-03-07T01:09:17+00:00","article_modified_time":"2019-05-31T03:19:29+00:00","og_image":[{"width":480,"height":317,"url":"https:\/\/smithink.com\/wp-content\/uploads\/sites\/478\/2019\/05\/Lessons-from-the-hackers.jpg","type":"image\/jpeg"}],"author":"marvin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"marvin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/smithink.com\/2016\/03\/07\/lessons-from-the-hackers\/","url":"https:\/\/smithink.com\/2016\/03\/07\/lessons-from-the-hackers\/","name":"Lessons from the hackers - Smithink","isPartOf":{"@id":"https:\/\/smithink.com\/#website"},"datePublished":"2016-03-07T01:09:17+00:00","dateModified":"2019-05-31T03:19:29+00:00","author":{"@id":"https:\/\/smithink.com\/#\/schema\/person\/03caa179bd15e4165688fcb8757cd9f3"},"breadcrumb":{"@id":"https:\/\/smithink.com\/2016\/03\/07\/lessons-from-the-hackers\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/smithink.com\/2016\/03\/07\/lessons-from-the-hackers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/smithink.com\/2016\/03\/07\/lessons-from-the-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/smithink.com\/"},{"@type":"ListItem","position":2,"name":"Lessons from the hackers"}]},{"@type":"WebSite","@id":"https:\/\/smithink.com\/#website","url":"https:\/\/smithink.com\/","name":"Smithink","description":"Experience delivers the how","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/smithink.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"Person","@id":"https:\/\/smithink.com\/#\/schema\/person\/03caa179bd15e4165688fcb8757cd9f3","name":"marvin","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/smithink.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/dea7335c8ba69364fc85b1b30c77022b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dea7335c8ba69364fc85b1b30c77022b?s=96&d=mm&r=g","caption":"marvin"},"url":"https:\/\/smithink.com\/author\/marvin\/"}]}},"_links":{"self":[{"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/posts\/10319"}],"collection":[{"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/users\/854"}],"replies":[{"embeddable":true,"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/comments?post=10319"}],"version-history":[{"count":2,"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/posts\/10319\/revisions"}],"predecessor-version":[{"id":10595,"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/posts\/10319\/revisions\/10595"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/media\/10320"}],"wp:attachment":[{"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/media?parent=10319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/categories?post=10319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/tags?post=10319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}