+33 (0)2.22.06.80.93
Ransomware: how to know where it was sent in your company!

Ransomware: how to know where it was sent in your company!

audit4mail helps you fight against ransomware

Ransomware: how to know where it was sent in your company!

 

Ransomware is big in the news these days, but what is it exactly?


A ransomware is a malicious software that hijacks your data. To do so, the ransomware encrypts the data and then asks the owner to send money in exchange for the key that will allow you to decrypt your files.

Your users receive an email. They download the attachment (ZIP) out of habit, and then, everything goes wrong! Here you are with encrypted files everywhere and you do not know who is the origin of the infection!

Let’s see how AUDIT4MAIL is going to help you find out in  just a few clicks who received the ransomware in your company. 

Go to the Helpdesk module, in the “e-mails” section. You use the search module by e-mail address, by subject, by date, depending on the information you have gathered so far on the ransomware.

spam ransomware

Once you have identified the suspicious e-mail, you can visualize already some key information:

– Date and time the e-mail was first received in the company

– List of the people who received it internally

By right-clicking of the external e-mail address, sender of the ransomware, a menu is displayed that allows you to go further in the analysis.

Then click on “go to dashboard

spam ransomware

Persons Dashboard

This dashboard, filtered on the suspicious e-mail address, is going to give you many details on the activity of the ransomware within the organisation. For exemple the total number of infested internal e-mail addresses, and the list of the employees who received the ransomware in their inboxes.

spam ransomware

The relations graph

Through the relations graph you get a visual representation of the ransomware’s activity in the company. It’s easy to share with management and the various heads of departments.

AUDIT4MAIL is a messaging intelligence tool. The dedicated module for IT and administrators provides many useful information about the e-mail system. 

It is a real support for your helpdesk with different visualisations of your messaging infrastructure.

With AUDIT4MAIL your IT can:

– Check the evolution of the email’s server volumetry (number, size, attachments, …)

 – Anticipate the servers / network bottlenecks.

– Collect metrics before changing the messaging system.

– Check the volumetric evolution by email users.

 – Detect of Internal spammers.

 – Measure the adoption of new communication tools (chat, CSR, document sharing).

– Observe the distribution of the devices used. On premise client, web email, smartphone.

– Improve the  customer service and the helpdesk processes.

 – Enable the billing of the internal email service.

Did you find this tutorial useful? There are many applications of AUDIT4MAIL which are still to be unveiled, please check again our website, or why don’t you subscribe to our newsletter so that you don’t lose any new article?

Our team can support you in many IT security projects.  Let’s schedule a live demo and learn more about your challenges.

demo

Need to see the positive impact of your enterprise social network on reducing the emails’ and attachments’ volume in your company? Use audit4mail!

Need to see the positive impact of your enterprise social network on reducing the emails’ and attachments’ volume in your company? Use audit4mail!

Need to see the positive impact of your enterprise social network on reducing the emails’ and attachments’ volume in your company? Use audit4mail!
The project of implementing an enterprise social network requires a big investment for the company. However if the enterprise social network is not used at its best, there is no added value for the company.

A presentation regarding the success of the enterprise social network has been asked by the corporate direction three months after its implementation. Time flies and we have already reached the third month! The Head of Internal Communication, in charge of this presentation, rushes to your office. You are the famous Domino administrator of your company. She heard that you helped a lot of people in your company thanks to a powerful application called audit4mail. She is convinced she can also count on you to make the best presentation ever!

Here is the Head of Internal Communication’s request: provide data showing the volume of emails sent and received in the company have been reduced thanks to the newly implemented enterprise social network

She is absolutely right! audit4mail is the right tool to get this task properly done!
With just a few click, audit4mail provides you with the statistics related to the volume of emails sent and received in the company.

1. Click on the icon Report
2. Open the view All and get straight to the column Size and Attachment size

audit4mail reports

audit4mail provides you the size of emails and attachments sent & received in the company for a specific month and year. You can give thes statics for the three latest months to the Head of Internal Communication.

You can go way further with audit4mail!

The users of your enterprise social network are only the employees of your company. Thus you would like to focus on the statistics related to the emails sent and received internally by your employees. To do so, follow those two simple steps:

1. Select the year and the month you need to analyze, then double click on the appropriate line
2. A new document opens, go straight to the tabs Vol. Attachment (MB) or Volume (MB) and click on Days at glance

audit4mail histogramme

The bar chart shows you at a glance the evolution of the size of the attachment sent and received internally by your employees. This same bar chart could be generated for the email’s size. To do so, click on the Volume (MB).

How audit4mail helps you to maintain staff well-being at work ?

How audit4mail helps you to maintain staff well-being at work ?

Today there is a big concern related to the staff well-being at work and the need for them to be disconnected after office hours. An employee reached by email late in the night on a regular basis will never be disconnected, therefore he is more likely to suffer from stress at work.

The Human Resources department, in charge of the staff well-being at work, must be able to quickly identify the employees working after office hours.

To achieve this, the Human Resources department comes to you, email Administrator. The goal is to identify the related employees and make them aware of the potential burnout for him and its peers.

The request of the Human Resources department is the following: provide a state of art of the emails sent after the office hours.

So easy task with audit4mail!

audit4mail provides you the statistics related to the emails sent each day including weekends. On the top of that, thanks to audit4mail get the list of the employee sending emails after office hours on a regular basis.

Here are the simple steps you need to follow. In few minutes you will become the most popular administrator of the Human Resource department!

Report component to identify the specific days

1. Click on the icon Report
2. Open the view By server and choose the server, the year and the month to analyze

audit4mail ecran serveur

3. Double click on the appropriate line
4. A new document opens. Go straight to the tab Messages

audit4mail serveur stats

The histogram here shows you at a glance the number of emails sent each day of the selected month. The tab External provides you the same information in a calendar view. Here, we can easily identify the weekends for which a great amount of emails have been sent.

audit4mail

Of course, we are not gonna stop here… especially when audit4mail can take the analysis way further!

Monitoring component to identify the senders and the subjects of the emails

How can we distinguish the employee sending emails after office hours on a regular basis from those who exceptionally needs to work outside the office hours due to projects’ deadline?

Simple! Find out the senders and subjects of the specific emails in audit4mail to get this information.

1. Click on the icon Monitoring
2. In the view by date, browse until you find the specific emails
3. For the related date, open the different documents and pick the names of the senders and emails ‘ subject

audit4mail ecran email info

User Report component to identify the employee who work after the office hours on a daily basis

1. Click on the icon User Report
2. In the view By user, find out the right senders
3. Pick the right year & month and double click on the appropriate line

A new document opens. Go straight to the tab “Message” and find out the frequency of emails sent after office hours for the specific employee.

audit4mail message horaires

Here for the targeted employee, we notice that he doesn’t send emails during weekends on regular basis: exceptionally he sent an email on Saturday the 8th of March.

Did you find this tutorial useful? There are many applications of Audit4mail which are still to be unveiled, please check again our website, or why don’t you subscribe to our newsletter so that you don’t lose any new article?

If you would like to analyse the content and the statistics of your email data, just fill in our contact form and we will call you back right away.

CEO email Fraud: audit4mail helps you highlight information

CEO email Fraud: audit4mail helps you highlight information

CEO email Fraud: audit4mail helps you highlight information.

Transfer order scams have caused over $2.3 billion in damage since 2013, and claimed victims in every U.S. state and in at least 79 countries (figures); at least 17,642 victims (mainly companies) have suffered their disastrous consequences. Some have lost all, or at least part, of their cash flow. And in serious cases, it ended in the windup of the company.

A wire transfer is a financial transaction from one account to another. Once a wire transfer order is accepted by the banking system, it cannot be canceled: it’s irrevocable.

The scam attempt consists in getting a corporate collaborator to execute a transfer order for a seemingly good cause. But, in reality, it’s all for the benefit of a crook. There are two ways they can get in touch with your company: by phone and by email.

CEO email Fraud

 

By providing the means to conduct a careful analysis of email data, AUDIT4MAIL helps companies avoid getting duped by these clever con artists.

Listed below are the variations these types of scams can take (this list is not exhaustive), how to protect yourself from them, and how AUDIT4MAIL can help you:

The “fake president” scam

In this scenario, a scammer poses as a company executive and tries to convince one of your employees, by email, to perform an urgent and confidential transfer to an account (often based abroad). To do this, the scammer is simply using information about the company and its leaders that they’ve either gathered from the internet or culled from previous telephone conversations with the company.

How to protect yourself:

Verify the identity of the caller by contacting him again, this time using safe, common details (e.g. those from the corporate directory and not those supplied by the caller), or simply by consulting the “My timeline” interface on AUDIT4MAIL—you won’t regret it.

CEO email Fraud a4m

 

Check the email address: Sometimes scammers use addresses that closely resemble the real thing.

For example, they’ll use jean.dupont@sale-team.com instead of jean.dupont@sales-team.com. AUDIT4MAIL provides you with an at-a-glance indication if your contact truly is your daily operations partner.

AUDIT4MAIL will automatically distinguish between the two emails by comparing email addresses. You can therefore avoid fraud—and then notify the authorities!

The internal emails (in green) in normal interactions:

CEO email Fraud audit4mail

 

The email address of the person trying to steal an identity (in blue):

ceo email fraud.png

 

Notify your superiors: a well-intentioned person would not ask you to hide information from your managers.

Respect the separation of powers:
-If you possess the rights to make significant payments alone, you are at risk. Talk to your manager about this (no one should have all three powers of: transfer, entry, and validation for payment).
-The means of authentication and signatures are personal: never entrust them to a colleague, and refuse if a colleague shares theirs with you.
-The separation of roles doesn’t only protect the company, it also protects you.

The “bank details” scam

A scammer leads one to believe there has been a change of bank details of a lessor, a vendor, or any other creditor of the company, for the next rent payment (or any other type of bill). This may seem like a normal pattern in business activity, possibly due to a management consolidation at a group level, a new bank, etc. The scammer then sends back the new bank details by e-mail, the message possessing characteristics very similar to those from the usual contact (e-mail, mail header, etc.).

How to protect yourself:

Verify the identity of the caller by contacting them again using safe, common details (e.g. those in the corporate directory and not those provided by the caller) during any details change request (email, telephone number, etc.) or when providing new bank account details. Be sure to check AUDIT4MAIL’s “Account panorama” interface in order to verify the caller’s email. And while you’re at it, consider contacting another person from the company to validate the information.

audit4mail CEO email Fraud

Use 2 channels for accounts residing abroad (for example, verify identity by both email and telephone number).

Be suspicious if the new account is located abroad
The ISO country code is found in the first 2 letters of the IBAN, and the 5th and 6th letters of the BIC.
• Cyprus: CY17002001280000001200527600 – BIC: ABKLCY2N
• US: US7630046001290029721519546 -BIC: ABCDUS1N
• FR: FR7630046001290029721519546 -BIC: ABCDFR3N

Cover your customers’ and suppliers’ bases against computer intrusions.
Write to your customers to educate about the proper protocol and encourage them to follow the rules.

The “computer” scam

In this scenario, the scammer poses as a technician from the targeted company’s bank’s connectivity service and tries to convince the employee to execute “transfer tests.” They may also impersonate one of the company’s IT service providers and request the installation of software with the secret intent of recovering security information or hacking the company’s computer network.

How to protect yourself:

Contact your bank’s business manager using the usual contact information in order to verify the identity of any person claiming to be part of their team.
Refuse remote logins on your PC from any person whose identity is unverified: do not go to a suspect Internet address, do not click on suspicious links, etc.
Do not perform tests requested by a technician: Do not add third-party accounts and do not commit to transactions or discounts. Never do a transfer test with a higher value than $1, even if it comes from your initiative.
Never share personal codes with anyone (e.g. numbers generated by your wireless reader, passwords, PIN codes, etc.).
Protect both your computer network and your PC against intrusions and malware.

In case of fraudulent transfer or suspicion:

1- Warn your hierarchy
2- Contact your bank
3- Contact the police

How Audit4mail can help:

AUDIT4MAIL helps you distinguish your employees’ and partners’ emails from those of scammers via a quick-and-easy interface.

For more information contact us

contact us

How to display all the recipients of a Bcc email message with Audit4mail

How to display all the recipients of a Bcc email message with Audit4mail

A very simple tutorial to show how you can easily spot and analyse emails with Bcc.  

Bcc is a copy of an email message sent to a recipient whose email address does not appear in the header lines. Among the many different applications of Audit4mail for your company email system, a very useful one can be how to identify and analyse emails with Bcc addresses. Let’s take an example:  the CFO of your company has just received a suspicious email containing some confidential information (your company’s financial statement which has not been published yet!). He is nervous and he contacts you simultaneously (you are a email administrator, with privileges access on personal information). He needs the names of all the employees who received the same information.

This is a very easy task ! With Audit4mail you can retrieve all the emails addresses put in Bcc of an email.

1) Click on the icon « Helpdesk » and the sub menu « Emails »

audit4mail helpdesk module

2) Use the search function: a new box will appear on the right side of the interface and let you perform a search.

3) Write for example the email address of the CFO in the « receiver » field and any other information you may have to refine the search (subject of the email, date, etc..)

audit4mail search module

4) Identify the suspicious email in the list appearing in the lower part of the interface.

5) On the right column, you can easily read the email adress(es) of the person(s) put in Bcc.

audit4mail search result

6) You can double click on the line to display more information, in particular you can see the email history.

audit4mail email history

Did you find this tutorial useful? There are many applications of Audit4mail which are still to be unveiled, please check again our website, or why don’t you subscribe to our newsletter so that you don’t lose any new article?

If you would like to analyse the content and the statistics of your email data, just fill in our contact form and we will call you back right away.

CFO, would you like to calculate accurately the infrastructure expenses for each department of your organization ?

CFO, would you like to calculate accurately the infrastructure expenses for each department of your organization ?

In order to elaborate a quality monthly business report, the data linked to the volume and infrastructure expenses must be accurate for each department.
How to accurately estimate those expenses for each department ?

Dealing with the head of department has never been an easy task, especially when this leads to allocate the right amount of money for the upcoming month.

The CFO of your company is fed up with the monthly debate with the different heads of department.
He is wondering if there is an automatic and reliable way of estimating the overall infrastructures’ expenses for each department. He heard that you helped a lot of people in your company thanks to a powerful application called audit4mail. So he decided to come to your office and ask for help. You are the famous Domino administrator of your company.

Here is the CFO’s request: provide accurate data regarding the use of infrastructure for each department of the company.

That’s right! With just a few clicks, audit4mail provides you with the statistics related to the use of the infrastructure by each department.

1. Click on the icon “Users Monitoring “
2. Open the view By organization and expand one organization to see the data related to all sub branches of that organization

audit4mail stats

Here audit4mail provides you the number and size of the emails and attachments for each branch (blue circle) of the organization move4ideas. Also, you have those figures for each sub-branches (green circle) of the organization. All data provided are categorized by year and month.

Page 1 of 212
Receive our latest posts by email

5551f2cd349e0977f33fe22027ad153a//////////