Recently, an attempt at identity theft through the company’s email addresses (“phishing”) has been detected. Cemex has made its best efforts, both human and technical, to control the effects of such undesirable and criminal activities, which unfortunately are widespread across the internet and the use of new technologies. Of course, we have reported these incidents to the relevant authorities.
We have taken steps to inform our customers of these events so they can exercise caution regarding any suspicious communication that may be fraudulent. We have reminded them that the account numbers for Cemex invoice payments are always those that appear on the invoices themselves.
Additionally, we have reminded our customers that Cemex only uses corporate email accounts. Therefore, any communication not originating from an email address in the following formats: [email protected], [email protected], [email protected], [email protected], [email protected] or [email protected] should be considered suspicious and unofficial. Customers have been advised that if they receive any communication requesting payment to a different account number, altering the payment period of an invoice, suggesting alternative payment methods, or any other suspicious sign, they should contact their Sales Representative immediately before making any payment.
This serves as a general reminder to us all about the threat of phishing, and we make some general recommendations:
- Be wary of unexpected attachments and links: Do not open attachments or click on links in unsolicited emails or messages.
- Use strong, unique passwords: Create strong passwords for each of your accounts and avoid using the same password across multiple sites.
- Verify requests for personal information: Legitimate companies will not ask for sensitive information via email.
- Stay informed about phishing tactics: Keep up to date with the latest phishing techniques and common scams.
By following these recommendations, you can significantly reduce the risk of falling victim to phishing attacks.