If you didn’t know, October is Cybersecurity Awareness Month in the US. This year’s theme is “Do Your Part. #BeCyberSmart.” The goal is to encourage organizations and employees to take ownership of protecting their part of cyberspace, stressing accountability and proactive actions that enhance security.

In the payments and point of sale world, PCI DSS and related standards create a framework that, when followed, do an admirable job of protecting merchants from cyber criminals. Unfortunately, even the most robust security measures can be thwarted by one employee clicking on an email link they shouldn’t. These cyber criminals have caught on to this effective attack vector, known as phishing. Recognizing that phishing has become a serious threat, we wanted to share some details regarding these attacks as well as actions you and your customers can take.

Phishing basics

Phishing is an attack whereby a bad actor sends emails or messages that look authentic to the user(s) receiving it. The message typically plays on a sense of urgency (e.g. subject lines like "URGENT: Billing Information Audit") and appears to be from a trusted source.

The real goal of the email is to gain access to IT assets or to steal information. Common motives of phishing attacks include:

  • Conducting financial crimes, such as convincing someone to wire transfer money
  • Gaining access to accounts (such as email, company, or gateway accounts)
  • Accessing and stealing emails (also called email harvesting) to use for other advanced phishing campaigns on parties that may trust you.

Identifying phishing attacks

While phishing tactics continue to evolve, here are some common indicators:

  • Displayed Name vs. Sender/Reply-to email address

Always look at the full email address of the sender in addition to its displayed name. The displayed name can be easily changed by attackers to show whatever they desire, so ensure that the return/reply-to email address and display names match what you expect

  • Encrypted file with a password in body

Extra scrutiny should be placed on any email that includes an unsolicited attachment, especially if the file is encrypted or hidden within compression (i.e., .ZIP files) and there is a password included in the email body. Encrypting attachments is a common way to bypass email anti-virus scanners

  • Double-check any links

Before clicking any links, make sure to hover mouse over the link until the full address is shown. Check that the domain of the link is owned by someone that is expected

Thwarting phishing attacks

From an outsider’s perspective, phishing appears to be a threat that’s no threat at all. Aren’t phishing emails obvious? Won’t employees and customers be wise enough to identify these threats? Unfortunately, phishing has gained popularity among criminals because it works. Therefore, it’s good to share this information and help raise awareness among email users. If you suspect something is off about an email:

  • Make the safe choice and check its authenticity.
  • Don’t open any attachments or click any links. Instead, visit the authoritative website you know that is attached to that requested process.
  • Contact the sender by an alternative method. Reach out to the sender using an existing contact method. If they included a contact phone number in the email, don’t trust it until you can independently verify the number.
  • Report the email in accordance with internal security policies. Security professionals can investigate the email contents more closely.

Turn on Two-Factor Authentication

Despite your best efforts and earnest attempts at following best practices by your users, criminals are relentless and, frankly, talented at getting access to credentials. In these instances, you can strengthen security by adding another step to the authentication process. Called multi-factor authentication (MFA) or two-factor authentication (2FA), the security strategy adds the need for an additional piece of information (or token) beyond a username and password. In the event a password and username are stolen, the 2FA token, which is randomly generated and changed frequently, will protect the account from being accessed.

Many IT solutions and software include the option for 2FA/MFA, but it’s not always enabled by default. 2FA is an available security feature on all NMI accounts. If you have any questions or require assistance implementing 2FA, please contact NMI Gateway Support.

Security isn’t a destination, but rather a perpetual journal. Following these best practices is just one aspect of a holistic security strategy that must be followed strictly. While Cybersecurity Awareness Month lasts only 31 days, the task of securing IT assets and information never ends.

Talk to Our Team

Fill out the form and a member of our team will get in touch with you to go over any questions you have.

Credit Card Flow — The Journey Data Takes From Swipe to Payment
NMI Insights

Credit Card Flow — The Journey Data Takes From Swipe to Payment

You click the pay button. A second or two later, you get an order confirmation. You’re done. Success! That’s how most consumers think about cr... Learn More
Understanding Level 2 & 3 Interchange Rates: An Essential Guide
NMI Insights

Understanding Level 2 & 3 Interchange Rates: An Essential Guide

Business-to-business (B2B) and business-to-government (B2G) companies regularly spend too much on interchange fees. Most of the time, they don... Learn More
Embedded Payments are Blurring The Lines Between ISO & ISV
NMI Insights

Embedded Payments are Blurring The Lines Between ISO & ISV

Independent sales organizations (ISOs) and independent software vendors (ISVs) are parts of the payments ecosystem that, until recently, have ... Learn More
Improving the SMB Merchant Experience
NMI Insights

Improving the SMB Merchant Experience

Small and medium-sized businesses (SMBs) represent one of the most vital components of the economy, contributing to global growth, innovation ... Learn More
NMI’s Payment Playbook: How Embedded Finance Is Reshaping Financial Solutions
NMI Insights

NMI’s Payment Playbook: How Embedded Finance Is Reshaping Financial Solutions

As traditional embedded payments become table stakes, savvy independent software vendors (ISVs) are expanding by introducing broader financial... Learn More
Embracing Self-Serve Retail: The Evolution of Unattended Shopping
NMI Insights

Embracing Self-Serve Retail: The Evolution of Unattended Shopping

You have one item in your basket. A quick purchase – hopefully. You go to checkout and see a familiar sight - the registers are all understaff... Learn More
PayFacs: The Ins and Outs of The Payment Facilitator Model
NMI Insights

PayFacs: The Ins and Outs of The Payment Facilitator Model

Payment facilitators (PayFacs) are companies that provide merchant services to businesses in various industries. Their primary service is paym... Learn More
NMI’s Payment Playbook: Navigating a New Era of Financial Integration
NMI Insights

NMI’s Payment Playbook: Navigating a New Era of Financial Integration

Beyond the buzz of embedded payments lies embedded finance. This emerging market encompasses embedded financial solutions such as banking, len... Learn More
Top 5 Tips for Reducing Payments Fraud
NMI Insights

Top 5 Tips for Reducing Payments Fraud

Digital payments have quickly become the preferred payment method for consumers worldwide. They are quick, easy and create opportunities for d... Learn More
Will Cash Continue to Endure in Consumer Payments?
NMI Insights

Will Cash Continue to Endure in Consumer Payments?

The global pandemic saw both a considerable acceleration in the growth of digital payments and a significant pullback in cash use. For years, ... Learn More