"It is bizarre how hackers can nestle themselves in your company so unnoticed."
Ruben Stelma, RAVOTT
@ravottkoffie
Cybersecurity

Ruben Stelma is involved with coffee every day. He offers barista training, travels the country with his luxury mobile coffee bar, and rents out coffee machines. While he sold his moped just 12 years ago to buy his first professional espresso machine, he was recently robbed of his money in a less pleasant way. Hackers targeted the business transactions of his company, RAVOTT, and even contacted his customers directly.
"I can hardly believe people would go to such lengths to siphon off other people's income," shares Ruben Stelma. Ruben, a welcome guest at trade shows, events, store openings, and more, was alerted by an observant customer to some strange emails from his company.
"I received a call from a customer. Shortly after sending our invoice, another email arrived from our address stating that the invoice had been revised and that the bank details had also changed. They asked if they could please pay into this new bank account. Fortunately, my customer (unfortunately, from personal experience) was very alert to this and called me immediately."
"At a time like this, you do not know what is expected. I immediately called my hosting provider and changed all my passwords. Unfortunately, that did not solve the problem."
At his client's suggestion, Ruben contacted Agerion IT, and together we investigated the extent of the hacking. It turned out the hackers had been conducting extensive email conversations with several clients. These conversations were so convincing that invoices had even been paid to the hackers.
This immediately explains the invoices that Ruben had been receiving for some time, and for which reminders went unanswered. The hackers had so cleverly infiltrated RAVOTT's email environment that they were able to perfectly intercept, delete, or even modify entire messages.
"It is bizarre how hackers can nestle themselves in your company so unnoticed."
Ruben Stelma, RAVOTT
@ravottkoffie
Besides being incredibly confusing when something you don ot understand is happening, it also makes you feel insecure. You no longer know what is safe. Your online accounting software, your outgoing emails, your incoming emails, your bank accounts... But most importantly: which customers might have fallen for it and actually paid these cybercriminals?
In one case, a customer even transferred a few thousand euros to the hackers. As a company, you also get unwanted conversations at such times. Whose fault is it? Could they have noticed? Who is going to lose out? You want to retain your customer for the future, but also get your money back. Of course, you also need to engage a specialist—an unexpected investment nonetheless. Ruben: "An added benefit is that you will now be using a well-secured system."

I can truly recommend this to every entrepreneur, and yes, this sounds like a commercial, but I am simply sharing my positive experience with Agerion: contact them. For me, this was a simple step because my client had experienced a similar problem and told me Agerion had resolved it for them. I would also recommend checking your email provider's security. I now know that my email provider was not optimal either, which allowed for misuse.
I hope to have to worry about it as little as possible. It is a good feeling to know that Agerion has secured my email security and that they will also monitor it for three months to ensure everything remains secure and without threats. I will also be more vigilant than ever, ensure I have better passwords, and know where to go if there are any problems.


Agerion IT acts quickly and adequately.
We quickly analyze the damage and risks
And seal your IT environment well
PUBLICATIONS
This time a Hoeksche Zaken Magazine with a very special cover!
HOEKSCHE WAARD
On Friday, November 14, you are welcome to network, exchange ideas, and discover opportunities for collaboration.
MICROSOFT
Are you still working with Windows 10 within your organization? Then it's time to take action. There are several possible routes.