Invoice redirection scams are one of the most financially damaging fraud tactics affecting Irish businesses today — particularly small and medium-sized enterprises (SMEs) that often lack robust payment verification procedures. These scams are clever, subtle, and can catch even the most diligent finance team off guard.

In this post, we’ll break down how invoice redirection scams typically work, and more importantly, outline clear procedures your business can follow when a supplier asks to change their bank details.


What Is an Invoice Redirection Scam?

An invoice redirection scam, sometimes called mandate fraud, occurs when a criminal tricks a business into changing the bank account details of a genuine supplier — redirecting payments to a fraudulent account controlled by the scammer.

Here’s how it usually works:

  1. The Set-Up: The scammer monitors your communications, often through email account compromise or social engineering, to identify payment patterns and key suppliers.
  2. The Deception: They pose as a legitimate supplier and send an email requesting a change in bank account details — often using a lookalike email address or even compromising the real supplier’s email account.
  3. The Pay-Out: Your accounts team updates the supplier’s details and processes the next invoice payment — but the funds go directly to the fraudster’s account.

By the time the real supplier starts asking why they haven’t been paid, the money is long gone.


Why This Scam Works So Well

What makes this scam particularly dangerous is that it doesn’t rely on malware or brute-force attacks. It uses trust, timing, and a dash of social engineering.

Scammers often study their victims carefully, learning supplier names, invoice due dates, and internal approval chains. The fake emails they send often look just like the real thing — complete with signatures, logos, and familiar language.

Unless your team is trained to spot red flags and follows strict verification procedures, these scams are frighteningly easy to fall for.


Tips for Verifying Supplier Bank Detail Changes

To protect your business from invoice redirection scams, follow these practical steps every time a supplier requests a bank account change:

1. Always Call to Confirm – Using Trusted Details

Never rely on the contact details included in an email requesting bank changes. Always use the contact number you’ve previously saved for the supplier — or look it up on their official website. Speak to someone you know and trust in their accounts department.

It might feel like an extra step, but a 2-minute phone call could save your business tens of thousands of euro.

2. Verify in Writing – But Not by Email Alone

After a verbal confirmation, request a written confirmation of the change. This adds a second layer of verification and ensures there’s a documented trail of the request. However, don’t rely on email alone for verification — especially if that’s how the initial request came in.

3. Use a Supplier Change Request Form

Implement a standardised form in your company that must be completed for any supplier banking changes. This form should include:

  • Supplier name and contact
  • Previous bank details
  • New bank details
  • Date of request
  • Name of internal staff member processing the change
  • Signature of authorised approver

Make it company policy that no change is processed without this form completed and signed off.


IT Procedures to Support Fraud Prevention

While people are the first line of defence, your IT systems play a huge role in preventing and detecting fraud attempts.

At CK Computer Solutions, we help businesses across Dublin and beyond implement secure email systems, employee training, and fraud monitoring tools. Here’s how we can help:

  • Email Filtering & Monitoring: We’ll help ensure phishing emails and spoofed domains are blocked before they ever hit your inbox.
  • Multi-Factor Authentication (MFA): Adding MFA to your email systems makes it much harder for criminals to compromise staff accounts.
  • Audit Trails & Access Controls: We’ll help you implement IT controls to track who’s accessing sensitive supplier and finance data — and when.
  • Cybersecurity Awareness Training: We’ll train your staff to spot suspicious emails, verify requests, and follow secure processes confidently.

We’re not just here to install software — we’re your trusted managed IT services provider. We’ll work closely with your finance and procurement teams to integrate technology with policy and process.


Red Flags to Watch Out For

Train your team to stay alert for the following warning signs:

  • Urgent or last-minute requests to change payment details.
  • Poor grammar or formatting in emails, especially from regular contacts.
  • Slight variations in email addresses (e.g. suppliername@companny.com instead of company.com).
  • Emails that skip personal greetings or use vague language.
  • Requests that pressure staff to “just process this quickly.”

If something feels off — trust your gut and verify independently.

Invoice redirection scams can be devastating — but they’re also preventable with the right mix of process, technology, and awareness.

Take the time to build and enforce procedures around supplier bank changes. Train your staff regularly. And make sure your IT systems are properly set up to detect and block threats before they cause damage.

At CK Computer Solutions – Managed IT Services Dublin, we can help you review and strengthen your internal controls, protect your email systems, and provide ongoing training for your team. Whether you’re a small local business or a growing SME, we’re here to help you stay safe, smart, and secure.


Need help locking down your systems or training your team against invoice scams?
Get in touch with CK Computer Solutions today – and let’s build a safer digital foundation for your business.



Understanding DKIM, DMARC, and SPF: What They Are and Why They Matter

Email authentication protocols—SPF, DKIM, and DMARC—are fundamental to securing domain-based email systems against spoofing, phishing, and unauthorised use. These technologies work together to ensure that email claiming to come from a specific domain is actually authorised by that domain’s owner.

This post explains the function of each protocol, how they interact, and provides DNS record examples to assist with accurate implementation.

Protocol Overview and Purpose

  • SPF (Sender Policy Framework) allows a domain to list authorised mail servers via DNS.
  • DKIM (DomainKeys Identified Mail) adds a cryptographic signature to emails, verifying integrity and legitimacy.
  • DMARC (Domain-based Message Authentication, Reporting & Conformance) enforces alignment between SPF/DKIM and the visible “From” header, while also enabling detailed feedback through reporting.

Together, these protocols create a layered authentication strategy that helps protect your domain’s reputation and improves deliverability.

SPF: Authorise Sending Servers

SPF works by checking the envelope sender (the Return-Path) of an email against a TXT record in DNS. If the sending IP is not listed, the message fails SPF validation.

Example DNS record for SPF:

yourdomain.com.  IN  TXT  "v=spf1 ip4:203.0.113.5 include:spf.protection.outlook.com -all"
  • ip4:203.0.113.5 allows a specific mail server IP
  • include:spf.protection.outlook.com includes Microsoft 365 servers
  • -all indicates hard fail for unauthorised sources

Best practices:

  • Avoid using +all, which defeats SPF’s purpose.
  • Don’t exceed 10 DNS lookups (include: and redirect= count).
  • Only publish one SPF record per domain.

DKIM: Sign Outbound Mail with a Private Key

DKIM validates that a message’s content was not modified and that it originated from the stated domain. It does this via a cryptographic signature added to the email headers.

Example DNS record for DKIM:

selector1._domainkey.yourdomain.com.  IN  TXT  "v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3..."
  • selector1 refers to a key selector used by the signing mail server.
  • The p= value contains the RSA public key.

Best practices:

  • Use 2048-bit keys where supported.
  • Rotate keys periodically.
  • Ensure your MTA (Mail Transfer Agent) is correctly signing outbound email.

DMARC: Align, Enforce, and Monitor

DMARC ensures that either SPF or DKIM (or both) pass and are aligned with the domain in the “From” header. It also instructs recipient servers what to do with unauthenticated emails, and provides reports.

Example DNS record for DMARC:

_dmarc.yourdomain.com.  IN  TXT  "v=DMARC1; p=quarantine; rua=mailto:dmarc-reports@yourdomain.com; sp=none; adkim=s; aspf=s"
  • p=quarantine tells recipient to quarantine messages that fail DMARC
  • rua= defines the address to receive aggregate reports
  • sp=none sets a separate policy for subdomains
  • adkim=s and aspf=s enable strict alignment

Best practices:

  • Start with p=none to gather reports before enforcing policies.
  • Regularly review and analyse DMARC reports.
  • Use tools to parse and visualise report data.

Protocol Interoperability and Domain Alignment

These three protocols work together:

  • SPF validates the mail server sending the email.
  • DKIM verifies message integrity and authenticity.
  • DMARC ensures the “From” header aligns with SPF or DKIM domains and applies policy accordingly.

This alignment is critical because SPF and DKIM alone do not cover the “From” header—the most visible part of an email to users.

Example alignment failure:

  • Email claims to be from accounts@yourdomain.com
  • SPF passes for mail.vendor.com (used in Return-Path)
  • But the “From” is yourdomain.com, and they don’t match → DMARC fails

Implementation Considerations and Common Pitfalls

  • Publishing multiple SPF records—merge them into one
  • Using soft fail ~all permanently (should only be used during testing)
  • Misconfigured DKIM selectors or missing DNS records
  • Not enabling DMARC reports (rua=), which limits visibility
  • Assuming third-party services automatically support these protocols—many require manual setup

Subdomain note: Use the sp= tag in DMARC to control policies for subdomains explicitly. For example:

sp=reject

enforces rejection on subdomains too.

How CK Computer Solutions – Managed IT Services Dublin Can Help

While setting up SPF, DKIM, and DMARC is technically straightforward for experienced admins, ongoing management and monitoring are where most businesses stumble.

CK Computer Solutions offers expert assistance to:

  • Implement correct DNS records across multiple domains and services
  • Coordinate with third-party senders to align email sources
  • Parse and act on DMARC reporting
  • Harden policies over time while maintaining deliverability
  • Keep your systems compliant as standards evolve

We work with both cloud-based systems like Microsoft 365 and Google Workspace, and hybrid/on-prem environments. As your Managed IT Services provider in Dublin, we’ll secure your domain at the DNS, mail server, and policy levels—ensuring that your email reputation is protected and your communications stay trusted.



Technology plays a crucial role in running a successful business, but many small and medium-sized enterprises (SMEs) make costly IT mistakes. These errors can lead to security breaches, downtime, and financial losses. Here are seven common IT mistakes businesses make and how to avoid them.

1. Ignoring Cybersecurity Risks

Many SMEs believe they’re too small to be targeted by cybercriminals, but that’s far from the truth. Weak passwords, outdated software, and a lack of security awareness can make your business an easy target.

Solution: Implement strong password policies, enable multi-factor authentication (MFA), and train employees on cybersecurity best practices.

2. Failing to Back Up Data

Losing critical business data due to hardware failure, cyberattacks, or accidental deletion can be disastrous.

Solution: Set up automatic backups using cloud-based and offline storage solutions. Test your backups regularly to ensure they work when needed.

3. Using Outdated Hardware and Software

Older systems are more vulnerable to cyber threats and can slow down productivity. Delaying updates or sticking with obsolete technology can cost your business more in the long run.

Solution: Regularly update software and replace outdated hardware. Consider IT lifecycle management to plan upgrades efficiently.

4. Neglecting IT Support and Maintenance

Many SMEs only seek IT support when something goes wrong, leading to unexpected downtime and expenses.

Solution: Invest in proactive IT maintenance. Managed IT services can help prevent issues before they disrupt your business.

5. Lack of a Disaster Recovery Plan

Disasters, whether cyberattacks, natural disasters, or human errors, can cripple a business without a recovery plan.

Solution: Develop a disaster recovery plan that includes data backups, business continuity strategies, and clear steps for getting operations back on track.

6. Not Securing Remote Work Setups

With remote and hybrid work becoming more common, unsecured home networks and personal devices pose security risks.

Solution: Use Virtual Private Networks (VPNs), enforce security policies for remote access, and provide secure company devices when possible.

7. Overlooking IT Compliance and Regulations

Businesses must comply with data protection regulations like GDPR. Failing to do so can result in legal issues and fines.

Solution: Stay updated on compliance requirements and implement proper data handling practices. Consult an IT professional if unsure about regulations.

Need help?

Avoiding these common IT mistakes can save your business time, money, and stress. Investing in IT security, maintenance, and best practices is essential for long-term success.

If you need help securing and optimising your business IT, CK Computer Support can provide expert assistance. Get in touch today to ensure your business stays protected and productive.

 



Unlock the Secret to Small Business Success with a Simple Email Signature

You’ve just sent a proposal to a potential client. They skim through your email, intrigued by your offer. But something is missing. There’s no professional touch, no visual brand reinforcement—just a plain text sign-off with your name and phone number. Now, imagine the same scenario, but this time, your email ends with a sleek, well-branded signature that includes your logo, contact details, and even a call-to-action linking to your latest offer. Which one do you think leaves a lasting impression?

For small businesses, first impressions matter, and your email signature is more than just a name at the bottom of a message—it’s a powerful branding tool. A well-crafted signature builds credibility, enhances professionalism, and even boosts marketing efforts by subtly promoting your business with every email you send. But managing email signatures across your team can be a nightmare without the right tools. Inconsistent branding, manual updates, and clunky formatting can make your business look unpolished rather than professional.

That’s where email signature software comes in. 

Key Features to Look for in Email Signature Software

Not all email signature software is created equal. If you’re investing in a solution, it’s essential to choose one that meets your needs and helps you maintain a consistent brand image across your organisation. Here are the critical features to look for:

1. Customisation Options: Templates, Fonts, Colours, and Social Media Integration

Your email signature should reflect your brand’s identity, just like your website and marketing materials do. The best email signature software will allow you to:

  • Choose from professional templates that suit your brand
  • Customise fonts, colours, and layouts to maintain consistency
  • Add social media icons so recipients can connect with you on LinkedIn, Twitter, or Facebook
  • Include banners and promotional links to highlight special offers or company news

A static signature won’t drive engagement, but an interactive, well-branded one can enhance credibility and even generate leads.

2. Centralised Management for Consistency Across the Organisation

If your employees create their own email signatures manually, you’ll end up with inconsistencies—different fonts, outdated details, and missing logos. A centrally managed email signature solution ensures every email sent from your business looks professional and brand-aligned.

With a Managed IT Support provider like CK Computer Support, you don’t have to worry about manually updating each employee’s signature. We implement software that allows you to:

Apply company-wide signature templates
Update details in real-time without employee input
Ensure compliance with legal disclaimers or confidentiality notices

For businesses with remote teams or multiple offices, centralised management is essential to maintaining a strong brand identity.

3. Compatibility with Various Email Clients and Devices

Your email signature must work across all email clients—Gmail, Outlook, Apple Mail, Microsoft 365, and mobile devices. Some email signature designs look perfect on a desktop but become distorted or even disappear when viewed on mobile.

The right software will provide responsive, mobile-friendly designs that ensure your email signature remains professional no matter where it’s seen. CK Computer Support ensures that your chosen software is fully integrated with your existing email system, minimising technical headaches.

4. Analytics and Reporting Capabilities

Most small business owners don’t realise that email signatures can be a marketing tool. Some software solutions include analytics to track how recipients engage with elements of your signature:

📊 See which links get the most clicks
📊 Track engagement with social media icons
📊 Analyse banner performance to optimise promotions

With data-driven insights, you can refine your email signature strategy to improve conversions and engagement—turning every email into an opportunity to grow your business.

Best Email Signature Software for Small Businesses

There are plenty of options available, but here are some of the top-rated solutions that balance affordability, features, and ease of use:

1. Exclaimer

  • Best for: Enterprise-level branding and centralised control
  • Key Features: Drag-and-drop editor, advanced analytics, integration with Microsoft 365 & Google Workspace

2. CodeTwo Email Signatures

  • Best for: Small to mid-sized businesses using Microsoft 365 & Exchange
  • Key Features: Automatic email signature application, mobile-friendly designs, marketing banners

3. WiseStamp

  • Best for: Freelancers and startups
  • Key Features: Social media integration, call-to-action buttons, personalisation options

4. Rocketseed

  • Best for: Businesses focused on email marketing
  • Key Features: Click tracking, campaign banners, CRM integration

5. MySignature

  • Best for: Affordability and simplicity
  • Key Features: Mobile-friendly templates, social media icons, minimal setup required

How CK Computer Support Can Help You Implement the Right Email Signature Solution

At CK Computer Support, we understand that small business owners already have enough on their plate without worrying about technical email signature setup. That’s why we offer:

Consultation on the best email signature software for your business
Full integration with your existing email systems (Outlook, Gmail, Microsoft 365, etc.)
Centralised management and ongoing updates
Troubleshooting and IT support to ensure compatibility

With our Managed IT Services, we don’t just help you choose the right software—we handle the implementation from start to finish, so you don’t have to lift a finger. Whether you have five employees or fifty, we ensure your email signatures are professional, compliant, and effective.


Is Email Signature Software Worth It?

A well-branded email signature might seem like a small detail, but it makes a huge impact on professionalism, branding, and even marketing. For small businesses, investing in the right email signature software ensures consistency, saves time, and enhances brand credibility.

If you’re ready to implement a professional, managed email signature solution, CK Computer Support is here to help. Contact us today to discuss how we can seamlessly integrate the best software for your business—so you can focus on what you do best.

🚀 Get in touch with CK Computer Support today and take your business communication to the next level! 🚀


Contact Us