Do you know how your super is performing?

Mobbs & Company have a specialised team to assist with all your Self Managed Superannuation Fund needs.

We can assist with all areas of our Superannuation Fund, from setting up your SMSF to preparing your Financial Accounts and Taxation Returns. Our qualified staff are here to assist you; whether it is borrowing through your superannuation or any queries that you may have in between.

You can be assured that we can simplify your affairs and offer you the accurate and professional advice that you need, in a timely manner.

Want to find out more?

Finding it hard to hit your financial targets?

Our business benchmarking service analyses your business' position within the industry and identifies an action plan to increase profitability.

Want to find out more?

Accounting News

‘Bank-like heists’ make way for new wave of cyber crime

WARNING:  Identity theft is an increasingly popular method of cyber crime as opposed to “bank-like heists” of the past, and SMSF trustees are a prime target, according to a university professor.

 

 

Professor Matthew Warren, deputy director at the Deakin University Centre for Cyber Security Research, told SMSF Adviser cyber criminals are no longer simply after stealing lump sums by cracking through security systems.

Instead, criminals aim for identity theft, which allows them to assume the identity of the client and transfer funds out into a different account, going under the radar of SMSF firms on the lookout for suspicious external activity.

“Attackers wouldn’t necessarily go after superannuation funds to extract large sums of money in a single transaction because they know identity theft and assuming the identity of customers of those organisations would just be as successful,” he said.

Professor Warren said there is more than one route of attack facing trustees, but more often than not, the pathway is based around identity theft utilising a social engineering method.

“A social engineering attack is when you are trying to manipulate people’s actions in terms of a social context whether it’s via email, whether it’s phoning someone and pretending to be someone else or whether it is physically going into an organisation,” said Professor Warren.

“So in terms of threats you are not seeing one particular type of threat but you are now seeing the sophistication of attackers develop a number of different threat strategies into a single attack.”

 

 

KATARINA TAURIAN AND JOTHAM LIAN
Tuesday, 13 Jun 2017
accountantsdaily.com.au