Cyber Security Awareness Month 2022

cybersecuritydata breach
Cyber Security Awareness Month 2022

Cybersecurity Awareness Month is an initiative where government agencies and private industries collaborate to raise national cybersecurity awareness every October. The month is dedicated to sharing resources to educate business leaders and IT decision-makers on the new threat landscape, implementing best practices, and fraud-tackling strategies.

Cyber.gov.au announced the first week's theme is 'Have you been hacked?' With the recent Optus data breach, consumers are worried whether their information can be used against them to commit payment fraud or if fraudsters are potentially going to carry out further attacks on other businesses.

This blog explores how to detect warning signs if you suspect your sensitive information has been compromised.

How Do I Know If I've Been Hacked?

With the current threat landscape rapidly evolving, sophisticated cybercriminals are targeting businesses from all angles. It is crucial that you stay aware and up to date on the types of techniques fraudsters use to identify if your organization has been compromised.

Sometimes, a data breach can be obvious. Other times, it is more deceptive. Here are key indicators to look out for:

1. Unauthorised Transactions & Bank Activities

It is no surprise that most cybercriminals' main motivation behind their attacks is financial gain.

One clear indicator to know if your business has been infiltrated is if you identify unauthorized transactions and unusual bank activities. It may be obvious to spot that large funds have disappeared from your business account.

However, for SMEs, it could be unknown that a hack took place if perpetrators discreetly withdrew insignificant amounts. If you suspect your financial information has been compromised, there are a few things to look out for:

  • Duplicate payments

  • Suppliers with cancelled or returned checks

  • Abnormal invoice volume activity

  • Rounded invoice amounts

  • Transferring funds to an unknown BSB and account number

  • Unknown created business accounts

Accounts payable (AP) departments should ensure that all transactions are visible and transparent to minimize the risk of payment fraud. A good tip for organizations is to conduct external audits annually to detect and eliminate fraud such as false billing schemes, expense reimbursement schemes, and check tampering.

2. Unusual Account Behaviour or Suspicious Logins

Another indicator is if you identify unusual account behavior on accounts like unusual granted permissions or unknown users. For instance, you might not be able to access your ERP account, bank account, invoicing software, or email account using your username and password.

The tactic behind the attack is to gain access to sensitive files including personal information, phone numbers, credit card details, or email addresses while locking you out to restrict your access.

If the information has landed in the hands of the attacker, they may attempt the following:

  • Business identity theft

  • Defraud your organization

  • Commit Ransomware to return stolen data

  • Sell data on the dark web

  • Share data with other dangerous organized criminals

Organizations should be quick to act if they have been compromised. If you fall victim to a data breach then it's crucial you act immediately and follow your data breach response plan.

3. Unexpected Software Installs & Malware

Another sign of a data breach is if you identify any unexpected software installed on your work device such as laptops, tablets, or mobile devices. This is referred to as potentially unwanted program (PUP) which includes spyware, adware, or keyboard loggers.

PUPs typically appear when downloading a new program and going through the installation process impulsively. In addition, malicious software (malware) is a continuous method attackers use to infiltrate your organizational network through fake email attachments or visiting a fraudulent website.

Malware is a notorious method that can be delivered in several forms depending on the intention of the hacker who orchestrated the attack. Malware types include:

  • A computer virus designed to reproduce itself and spread across files or programs

  • A Trojan horse designed to damage, disrupt, steal or in general inflict harmful action on your data or network

  • Much like a computer virus, a computer worm that spreads across networks as opposed to a virus that spreads across files

Why Do People Hack?

Cybercriminals have various motives as to why they commit fraudulent activities. To reinforce this, organizational data is valuable information to criminals. This means that organizations of all sizes can be potential targets for falling victim. We explore five primary reasons why fraudsters target enterprise businesses:

Financial Gain

It is no surprise hackers' primary motivation is to defraud your organization through payment fraud schemes. Hackers will often target small-to-medium enterprises due to the lack of sophistication in cybersecurity controls of the business. The effort involved in targeting SMEs is minimal, having cybercriminals work less to achieve the same level of cyberattack.

For organizations, severe consequences occur in the aftermath of a cyberattack. For instance, once a cybercriminal has infiltrated your organization’s network or deceived your AP’s department, they may generate duplicate credit cards or steal the identities of victims to sell on the dark web.

Vulnerability Scanning

Another objective for cyberattacks is vulnerability scanning. This act involves hackers identifying security vulnerabilities by inspecting potential entry points that they can exploit on a computer or network.

Unlike penetration testing, vulnerability scanning allows criminals to plan & target low-hanging fruit because of the lack of education and resources of an organization. As a result, this tactic can lead to business identity theft, malware, or ransomware.

Religious, Political or Social Beliefs

Hacktivism is the act of hacking or infiltrating a network system with religiously, politically, or socially motivated purposes. According to Cyber.gov.au, hacktivists may target organizations using techniques aimed to cause disruptive or destructive harm. This can result in collateral effects on organizations beyond the primary intended targets.

Primarily, hacktivism is carried out by an individual or group’s perception of what they consider to be fair or unjust. An example of a real-world hacktivist group is identified as “Anonymous."

Anonymous is behind some of the largest hacktivist attacks in history, with 2022 seeing the group declare cyberwar on the Russian Ministry of Defence. Despite government efforts, organizations should be aware of hacktivists and the business disruption they may bring.

Espionage

Corporate espionage, also known as industrial or economic espionage, is a form of espionage conducted for commercial purposes. The purpose of corporate espionage is to achieve a competitive advantage in the marketplace by performing improper or unlawful theft of trade secrets or other knowledge.

Both governments and private organizations can be victims of espionage; however, the motivation behind the hacker to commit espionage is dissimilar. Typically, governments are compromised due to state secrets whereas private organizations are compromised to seek trade secrets.

CFOs Must Take Ownership of Their Cybercrime Strategy

With the increased cybersecurity threats landscape involving deep fakes, business email compromise, and malware, CFOs must be involved in every stage of their organization’s internal cybersecurity conversations, planning, and execution.

During this year’s cybersecurity awareness month, AP departments can increase their security awareness training so that they are more equipped to identify potential attacks and respond with the appropriate action.

Taking a step further in strengthening security controls and staying secure online is having Eftsure sitting in your accounting function. You can identify errors, fraud, and fraud attempts before releasing funds by verifying the bank account name, BSB, and account number.

Author

Niek Dekker

Published

12 Jun 2025

Reading Time

6 minutes

security-image

The New Security Standard for Business Payments

security-image
security-image