Holiday Hustle: How MSPs Can Shield Clients from Cyberthreats
Many employees do their holiday shopping at work, and remote work/work-from-home scenarios have only increased that behavior.
As the holidays approach, we can count on several things: Christmas decorations arriving in stores before Halloween is over; there never seems to be enough time to complete our holiday to-do list; we will overeat; and cybercriminals will have a field day trying to take advantage of our online shopping.
As more retail activity moves online, cybercrime has been on the rise. This is particularly true during holiday shopping events like Black Friday and Cyber Monday when otherwise astute internet users let their guard down in search of a bargain. In fact, according to the Gen Digital 2024 Cyber Safety Insights Report, nearly one in five adults is more inclined to “engage with questionable offers during holiday promotions. This is particularly evident among Gen Z shoppers, whose behavior is heavily influenced by urgency cues often used by attackers to bypass rational decision-making.”
Nearly half of U.S. consumers reported being targeted by a scam while shopping online during the holidays. Last year, IC3 issued a public service announcement warning about common holiday shopping scams. It noted that in 2022, they received reports from almost 12,000 victims of non-payment/non-delivery scams, creating losses of more than $73 million.
Retail Scams Put Corporate Networks and Data at Risk
But online shopping scams aren’t just a threat to individual consumers. Many employees do their holiday shopping at work (nearly 60% of them), and remote work/work-from-home scenarios have only increased that behavior — driving as much as $375 billion in additional online spending, according to Mastercard. That means these retail scams could also put corporate networks and data at risk.
Many of these scams are targeted at a single transaction — tricking shoppers into paying for items that never ship by offering too-good-to-be-true discounts on hard-to-find items, for example. QR code-based scams send shoppers to fraudulent websites after they scan a coupon. Brand impersonation is also common, with shoppers directed to websites meant to look like legitimate retail sites so they can capture personal payment information.
Workers also drop their guard during the holidays, making them more vulnerable to cyberthreats like phishing, social engineering campaigns and ransomware. Criminals take advantage of the types of staff shortages, operations changes and distractions common at the end of the year to steal account access.
Some of the more common online shopping scams include:
Impulse buying/scarcity: Fraudulent emails and advertisements use the urgency of flash sales or shortages to increase the likelihood of clicking on a malicious link. The Cyber Safety Insights Report notes that younger shoppers are particularly vulnerable to these scams.
Social media scams: Poorly monitored social media ads are responsible for many holiday shopping scams, with advertisements promising discounts but resulting in the theft of money and payment credentials. Cybercriminals are leveraging AI to create realistic ads that are difficult to distinguish from the real ones.
Travel scams: The Gen Digital data showed increased travel-related crimes that used sophisticated phishing techniques to rope victims into fake bookings or travel services.
How to Protect Against Holiday Cyberthreats
What can be done? Companies must take concrete steps to shut down brand impersonation scams in the retail sector. Last year, Amazon saw more than 45,000 phishing websites attempt to impersonate its website. In response, the company leveraged real-time domain monitoring to detect suspicious activity, backed up by analysis by AI and machine learning-based security solutions. They also worked closely with law enforcement to shut down fake websites. MSPs can help their retail clients deploy these solutions and offer monitoring services so retailers can focus on their core business activities.
For companies that want to protect themselves from shopping-related employee breaches, several potential steps exist.
Educate customers about online shopping risks. The IC3 guidance from last year is an excellent place to start. It emphasizes double-checking email and website addresses and being wary of discounts, deals and unusual payment requests. CISA also offers helpful holiday shopping security tips to share with clients and employees. In general, encourage everyone to stick to websites they trust and use regularly.
Implement multifactor authentication and strong passwords. MSPs should encourage this all year long to reduce the chance of a stolen or weak password being used to exploit system vulnerabilities.
Leverage AI and machine learning to help monitor for behavior that traditional security solutions might miss, and that can help initiate automated mitigation and response protocols.
Update all devices on the network with the latest software and security patches.
Guidance from Mastercard recommends implementing a domain-based message authentication, reporting, and conformance (DMARC) tool to protect against domain spoofing.
Implement security automation for repetitive tasks and processes. This is particularly valuable during the holidays, when the IT team may be short-staffed. Things like MFA enforcement, anomaly detection and triage/response can be automated so that staff isn’t caught off guard or understaffed if there is a surge in activity.
Institute holiday-specific security practices and protocols. Develop training and awareness programs for the holiday season and implement protocols to provide greater vigilance around shopping scams.
By planning ahead, deploying the right technology and educating clients and staff, MSPs can help reduce the risk of holiday cyberthreats. That allows everyone to focus more on their core businesses, relax during their holiday break, and prevent cyber-Grinches from stealing their data.
Read more about:
MSPsAbout the Author
You May Also Like