February 2025 Volume 7
OPERATIONS & MANAGEMENT
Other Inventive Online Threats Sophisticated tactics including fake reviews, false replies to complaints, and AI-generated phishing attempts are increasing. Fake Reviews on Legitimate Sites Scammers have figured out if they post product reviews that include a support number, people might call. After all, you’re probably frustrated already and want to get your issue fixed as quickly as possible. A positive support review that includes a phone number seems to make your life easier. But remember, even if the website is real, comments submitted by non-verified users could include information meant to deceive you into calling and unintentionally volunteering personal informa tion to a cybercriminal. False Replies to a Complaint on a Company Social Media Site Ever get frustrated with a company and decide to take your complaint public? If you post your dissatisfaction on Facebook, X, or other platforms, consider the possibility that any reply you receive might not come from the legitimate company, but from a scammer. If an offer to remedy the issue sounds too good to be true, be skeptical. Don’t give credit card or other personal information in comments or messages on social media sites. Compelling AI-Powered Email Phishing AI chatbots produce customized, convincing phishing emails that impersonate companies, colleagues and even family members with ease. AI emails don’t have misspellings or weird grammar, either. Since AI is efficient enough to capitalize on real-time information from corporate websites or news outlets, phishing attempts are even more believable. Remind everyone in your organization to always be on the lookout for phishing attempts. Check for these common elements of a phishing attack: • unknown sender • unusual and urgent request • link or attachment • consequences if you don’t respond
Next Steps Where do we go from here? As cybercriminals intensify and refine their efforts to deceive, it’s essential for each of us to stay aware of the risks. Slow down and pay attention when you’re using online resources. While it sounds cliché at this point, cybersecurity really is everyone’s responsibility.
Jim Kerr is President of CRU Solutions, a leading Cleveland-based managed IT services firm he founded in 1982. CRU Solutions has been serving the team at FIA for over 10 years. www.crusolutions.com Email: jim.kerr@crusolutions.com
FIA MAGAZINE | FEBRUARY 2025 55
Made with FlippingBook - Share PDF online