“Employees should not under any circumstance email sensitive employee information such as W-2s, benefit enrollment forms, completed census forms, or anything with social security or credit card numbers. Email is inherently insecure, and scammers may pose as company executives or employees to steal information.”
Phishing emails are a type of scam designed to obtain information or prompt certain behavior from their targets. To that end, they typically appear to come from a person or entity we trust.
In most cases, careful inspection will reveal cracks in the façade, little signs that the message is not what it purports to be. But, of course, most of us don’t thoroughly analyze every email we receive from a colleague or supervisor. When we get an email from our CEO, Lizzy Beth, we don’t hover the mouse over her contact card to verify that the message came from her actual company email and not brice@sneaky.scam. We see the email, assume Lizzy Beth wants us to send her the requested information, and send it.
A successful scam can be a costly data breach with legal consequences. Businesses are generally required to take reasonable precautions to protect personal information in their possession. In the event of a breach, many states require that notice be given to those whose information was compromised. This notice might need to include the cause and nature of the data breach as well as what protections are afforded to those affected.
One of the best ways to protect your company from these sorts of scams is to have a policy and practice of never emailing sensitive employee information. The language below may serve as an effective reminder:
“Employees should not under any circumstance email sensitive employee information such as W-2s, benefit enrollment forms, completed census forms, or anything with social security or credit card numbers. Email is inherently insecure, and scammers may pose as company executives or employees to steal information. If you receive a request to email any such sensitive information, do not respond to it. Instead, inform your manager immediately.”
You can help protect your organization by giving employees examples of the kinds of emails and other communications (texts, calls, etc.) that are likely suspicious. Here are a few:
Content provided by Ahola’s HR Support Center