Story image

Phishers no more - Xero's latest update revealed

22 Jun 16

With phishing attacks on the rise, Xero customers now have a safer way to send invoices - Two step authentication (2SA). 

Customers will no longer have to send the invoice by email, it's instead sent via Xero. This means that payment terms cannot be changed without having a Xero log in.

"Hackers are gaining entry into email accounts and altering the bank details in invoices before sending to an unassuming client," a company statement read. 

According to the 2015 Symantec Intelligence Report, finance companies were at the top of the phishing ladder so Xero's 2SA update couldn't come sooner. 

Along with the new security update, online invoices sent through Xero now feature a responsive design, ensuring that recipients of those invoices can pay small businesses more quickly. 

Craig Walker, Xero's chief technology officer, says ensuring customers get paid as quickly as possible is vital to the small business economy. 

“With today’s release, we’ve embraced responsive web design to ensure that our customers can not only send their customers online invoices, but that those invoices are displayed beautifully, regardless of the device their customers are using,” says Walker. 

Natalie Firth, director of Melbourne-based bespoke talent acquisition and optimisation consultancy Think Talent, says that in their work, cash flow is the biggest issue. 

"Xero's invoicing tool is quick and enables easy modifications to invoices to suit varying client requirements. We can email and track the invoices via Xero and see what is outstanding in one click. We only accept EFT payments so the ability to include a link to online payments means we are making things as easy as possible for our clients," says Firth.

"We are really happy with Xero as it is easy to use, manages our payroll, expenses and invoicing and can scale up to support us as we grow," she adds. 

ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).
'DerpTrolling’ faces jail time for Sony DoS attacks
A United States federal court has charged a 23-year-old man for the hacks on Sony Online Entertainment and other major companies back in 2014.
Kiwis concerned about being scammed – survey
This unease is warranted given the growing sophistication of scammers and their activities, and numbers of attempted fraud.
It's time to rethink your back-up and recovery strategy
"It is becoming apparent that legacy approaches to backup and recovery may no longer be sufficient for most organisations."
Dropbox strengthens security with raft of new partnerships
Integrations will keep customer content protected and secure with tools for controlling identity access, governing data, and managing devices.
Interview: Aruba’s NZ country manager talks channel strategy
“What we're taking to market is that message around simplification and having everything in one place.”
Companies swamped by critical vulnerabilities – Tenable
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.