- Phish & Tell
- Posts
- PHISH & TELL 029
PHISH & TELL 029
The Cybersecurity Brief for Women Who Mean Business
vgws
š WELCOME to Phish & Tellā¢ļø, from Security Done Easyā¢ļø
Youāre not just building a business. | ![]() |
š£ TOP CYBERSECURITY NEWS STORIES OF THE WEEK
Our blog won the Gold! š See the Personal Note section below!
Let me tell you, itās so hard to just pick the top 3 news stories for the week. š¬
AI helps fraudsters create realistic fake receipts
Source: Schneier on Security schneier.com
What happened: GenerativeāAI tools now produce photoārealistic fake receipts with wrinkles and all, itemized lists, and signatures. Expenseāmanagement software tries to detect AIāgenerated images by examining metadata, but fraudsters can circumvent detection by taking screenshots or photos.
Why it matters: Small businesses rely on receipts for reimbursements and accounting. Sophisticated fakes can slip through manual review, leading to fraudulent payouts or tax problems.
What to do: Consider using digital expense tools that crossācheck receipts against merchant data. Audit expense reports periodically and verify large purchases directly with vendors. Educate staff about the legal consequences of expense fraud. Worst case is requiring and saving paper receipts, but thatās not really realistic today for many businesses.Google sues operators of āSmishing Triadā phishing kit
Source: Krebs on Security krebsonsecurity.com
What happened: Google filed a lawsuit against the creators of Lighthouse, a phishingāasāaāservice tool used by the Chinese āSmishing Triad.ā It has duped over one million victims across 120 countries. Victims are asked to pay fake toll fees or delivery charges (I know Iāve gotten several of these SMS phishing ā aka smishing ā messages, myself). Then the scammers use the oneātime codes to link cards to devices they control.
Why it matters: Smishing attacks prey on busy people who pay invoices and shipping fees via text. A single employeeās mistake can expose both personal and company payment details.
What to do: Warn staff about fraudulent text messages. Donāt click links claiming you owe a fee; instead, go directly to the companyās official site. Turn on transaction alerts and use virtual cards for online purchases.Microsoftās November Patch Tuesday fixes zeroāday and critical bugs
Source: The Hacker News thehackernews.com
What happened: Microsoft patched 63 vulnerabilities across its products. Critical remoteācodeāexecution bugs in the graphics component and Windows Subsystem for Linux were also addressed, along with a highāseverity Kerberos issue that could let attackers impersonate any user.
Why it matters: Nearly every small business uses Windows. Unpatched systems can allow attackers to move from a lowāprivilege account to full domain administrator, enabling data theft or ransomware. (Note that ALL operating systems are vulnerable and should be updated as soon as updates are available ā Mac, Windows, doesnāt matter. Set it to update automatically so you donāt have to remember. Just donāt snooze it!)
What to do: Install Novemberās updates on all Windows desktops and servers. Encourage employees to run updates promptly and restart when asked. If you use Active Directory, review Kerberos delegation settings and apply vendor recommendations.Not sure what applies to your business or what your options are? Letās talk.
š In Case You Missed It (ICYMI)
This weekās blog post: From Reactive to Proactive Protection: A Managed Security Services Guide for Small BusinessesĀ» Understand why switching from āIāll deal with it if it happensā to a managed security services model isnāt just about paying a monthly fee -- itās about protecting your livelihood, complying with the law, and gaining peace of mind.
Looking for the Customer Journey Risk Map template? My web team should have it posted this week. Iāll include a link as soon as it is. (Itāll be on the Resources page on my website.) Read the related blog article here!
Follow us on LinkedIn, Facebook or Instagram. Youtube is in the works (subscribe to get notified when I finally start getting these videos out there!)
š¤ The LOL-gorithm

š§· THE SAFETY SNAP
The sheer quantity of email we get can be really overwhelming. Even with setting up automations and rules and labels and folders, etc.
Did you know that actually can be a security issue, not just an inconvenience? It makes it hard to spot the legit stuff, like log-in alerts.
š§¹ Quick Anti-Spam Guide: How to Keep Your Inbox Clean
1. Use built-in tools
Hit Unsubscribe for legit senders. (Iāve been using Googleās Manage Subscriptions option in the Gmail menu ā you can knock a bunch out at once.)
Use Report Spam only for scams or things you never signed up for.
Block repeat offenders.
2. Let filters do the work
Create simple rules like āIf email contains unsubscribe, move to Promotions.ā
Auto-label newsletters, receipts, and marketing emails.
3. Use smart email habits
Have a separate email for shopping, downloads, and sign-ups.
Try plus-addresses (name+shopping@ā¦).
Never use your main business email for freebies or online accounts.
4. Protect your address
Donāt post your email publicly if you can avoid it.
Use Apple Hide My Email or similar tools for low-trust sites.
5. For business owners
Make sure your domain has SPF, DKIM, and DMARC set up. (I have a free scanner on my website.)
Turn off catch-all addresses (theyāre spam magnets).
Use strict anti-spam settings in Google Workspace or Microsoft 365.
A few smart habits + the right filters = a dramatically calmer inbox. Let your tools do the heavy lifting.
BUT Be Kind to Other Businesses
If an email is from a legit business (especially a tool you use, a creator you follow, or a company youāve interacted with), use Unsubscribeānot Report Spam. (For texts, use STOP, rather than Report Junk or the equivalent.)
Unsubscribing quietly removes you from their list.
Reporting spam, though, can damage their sender reputation, get their emails blocked, and create deliverability headaches for a business that didnāt actually do anything wrong.
When a cybercriminal is going to do something that will likely generate an email alert to you (like try to get into your bank account), they will often first create a spam flood by signing you up for a bunch of stuff, such as newsletters. They use the spam to create chaos and pressure, deliberately making it hard for you to notice legitimate emails related to fraudulent online purchases, account updates, or identity theft. So what do you do if itās an actual attack? Iāll address that in my next blog post, so look out for it on Monday.
š¬ A PERSONAL NOTE
Your crossing your fingers for me worked! I mentioned that I was a finalist for a Stevie Award for Best Female Business Blogger and that I was going to find out where I was on the podium last Monday night at the awards ceremony. I got the gold! Thanks to all of you for reading and giving me feedback along the way. Read my blog articles here.
I love the idea, I love the content, and honestly, I think this is a brilliant solution to support and protect women-led small businesses. My favorite part is the trauma-aware blog and content. Congratulations on this inspiring and impactful initiative. The results are great, and the tools are impressive. Well done!

Other than that, Iāve been doing a better job listening to my fellow business owners and taking breaks so I donāt burn out. Iāve also been taking the kids out to do fun out-of-the-ordinary stuff (like hunting for the Thomas Dambo trolls and seeing Mesmerica. Did you know the artist who created Mesmerica was the drummer for The Pretenders, one of my favorite bands?! They just re-released The Singles, btw.)
š TELL ME
Have a story to share or a cybersecurity question? Simply reply to this email or leave a comment. Iād love to hear from you and include your tips or questions in the next issue!
Stay safe and see you next week! š

Youāre subscribed to Phish & Tellā¢ļø because your business is worth protecting.
š©·
