Story image

Phishers no more - Xero's latest update revealed

22 Jun 2016

With phishing attacks on the rise, Xero customers now have a safer way to send invoices - Two step authentication (2SA). 

Customers will no longer have to send the invoice by email, it's instead sent via Xero. This means that payment terms cannot be changed without having a Xero log in.

"Hackers are gaining entry into email accounts and altering the bank details in invoices before sending to an unassuming client," a company statement read. 

According to the 2015 Symantec Intelligence Report, finance companies were at the top of the phishing ladder so Xero's 2SA update couldn't come sooner. 

Along with the new security update, online invoices sent through Xero now feature a responsive design, ensuring that recipients of those invoices can pay small businesses more quickly. 

Craig Walker, Xero's chief technology officer, says ensuring customers get paid as quickly as possible is vital to the small business economy. 

“With today’s release, we’ve embraced responsive web design to ensure that our customers can not only send their customers online invoices, but that those invoices are displayed beautifully, regardless of the device their customers are using,” says Walker. 

Natalie Firth, director of Melbourne-based bespoke talent acquisition and optimisation consultancy Think Talent, says that in their work, cash flow is the biggest issue. 

"Xero's invoicing tool is quick and enables easy modifications to invoices to suit varying client requirements. We can email and track the invoices via Xero and see what is outstanding in one click. We only accept EFT payments so the ability to include a link to online payments means we are making things as easy as possible for our clients," says Firth.

"We are really happy with Xero as it is easy to use, manages our payroll, expenses and invoicing and can scale up to support us as we grow," she adds. 

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.