SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Are Phishing Attacks Angling for
You?
Phishing
Phishing is similar to an online con
game where attackers send
fraudulent email messages
appearing to come from trustworthy
sources to gain personal
information. These types of scams
vary in their complexity and their
attacker’s objectives, with spear
phishing and whaling attacks being
the more sophisticated forms of
phishing.
Phishing
Gone are the days when spear fishing meant “what you do
while vacationing in the warm waters of the Caribbean.” On
that same note, “whaling” has nothing to do with the
mammals nor one’s ability to have a “whaling good
time.” Now the terms are synonymous with being aware of
what comes through your inbox.
Rise in Phishing Attacks
Phishing attacks have been steadily rising
and are increasingly targeting
businesses. According to Verizon’s Data
Breach Investigations Report released last
year, 23% of recipients open phishing
messages and 11% of those people open
the links within these emails.
Furthermore, 50% of these recipients open
and click within the first hour. Email
filtering can catch some phishing attempts,
but not all, due to the rate at which these
emails are opened.
Spear Phishing
Spear phishing is directed at individuals and whaling attacks
are directed at senior level executives, also known as the “big
phish,” who have access to valuable information within a
business or organization. These attacks may occur utilizing a
malicious email that appears to come from a company
executive.
What is Spear Phishing?
Spear Phishing is a scam and you are the
target. It is an email that appears to come
from a business or someone that you
know, but in reality, it is malicious in form
and seeks to obtain sensitive information
(bank account numbers, passwords,
financial information, etc.).
What is Spear Phishing?
The spear ‘phisher’ thrives on all there is to know
about you. They research job titles, partner
information, company background, LinkedIn
accounts and personal social media outlets to
entice you into opening their emails. Just take a
moment to think about how much information is
available about you on the Internet.
Did you take pictures from a recent trip to Paris
and share them on Instagram; run a half-
marathon where your name and completion time
are easily accessible; or simply post the College
that you graduated from?
What is Spear
Phishing?
Once the spear phisher has this
information – game on! The next
email to you will probably use your
first name, reference a “mutual
friend,” how great you looked in
Paris, and congratulate you on
finishing first in your age group.
What are Whaling Attacks?
 Whaling attacks are the “it” hack of 2016. Whaling uses e-mail sent from spoofed
or similar-sounding domain names to make it appear as though these emails were
sent from senior executives of a victim’s company.
 This requires targeted research focused on the identity of an employee and the
organizational hierarchy within a company. This outreach is less personal in
nature.
 Whaling emails may be more difficult to detect because they don’t contain
hyperlinks or a malicious attachment, they rely solely on tactics that depend on
human interaction and to manipulate their targets.
What are
Whaling
Attacks?
According to the security firm,
Mimecast, around 55% of
organizations have seen an increase
in whaling attacks over the last three
months. Their research further
suggests that in 72% of the cases
whaling emails appeared to be sent
by the CEO of the company, while
36% seemed to come from the CFO.
What are
Whaling
Attacks?
 Whaling attacks have been identified
by hackers as the “golden goose.” If
you receive a branded “company”
email that promises reduced costs for
pet insurance, be careful about
opening any links or any attached
forms–especially if you just welcomed
a brand new Labrador Retriever
puppy into your life.
 These links may contain malware that
opens up the gates of your corporate
network.
What are
Whaling
Attacks?
 To avoid these damaging attacks, below
are three helpful guidelines to help you
stay protected. You may also contact
your IT Security Provider for more
information.
Navigate Your Inbox
The Sender
Always pay attention to who the email comes from.
If you are not familiar with the business or person it is
from, you might not want to open.
If you do open it, avoid clicking on any links until you can
verify the identity of the sender.
If it comes from your CEO, you are still not in the clear.
Check the URLs to make sure everything is legitimate.
If you are the only one being offered pet insurance in the
company, you know there is a problem.
The Sender
The subject line might help
in determining whether or
not the email is malicious.
However, we do heed
caution especially if the
subject references an
purchase like, “Thank you
for your recent iTunes
purchase” as an example.
The Content
As phishing gets more
sophisticated, this may come
less into play.
However, read through the
to ensure that everything is
spelled correctly, written in a
clear manner, etc.
These are telltale signs that the
email may not have come from
trusted source.
Very rarely will you receive
emails from a C-level executive
within your firm sending emails
that are not grammatically
correct.
The Call to
Action
 If you ever receive an email asking that
you send personal information, login
credentials or open an attachment –
don’t do it. Is there a moment where
you would actually contemplate giving
out your social security number via
email these days?
General Rules to Follow
Social
Media
Button up personal information that is living on the Internet. If
you don’t, spear phishers have access to your friends list, email
address, posts showcasing your Apple watch, etc.
Keep as much information as possible restricted by customizing
your security settings.
The less information out there about you, the less you are
a spear phisher to go by.
Social Media
In addition, don’t sign up for
apps through social media
unless it is reputable. Every time
you enter your information is
another opportunity to be
hacked.
Passwords
Think about your passwords. Is it your
birthday that is listed on your social
media site? Or another date of
significance? Do you use one
or variations of that one?
What about “123456” or “password”,
the two most commonly used and
easily hackable passwords other
there. Click here for more information
on what makes a good password.
Passwords
Every password for every site should be different,
really different and should include multiple
characters.
If you follow these rules, please do not keep a
standing list on the note section of your iPhone.
If your iPhone gets stolen, not only did they get a
new device but, more importantly, that device has
just become their “golden ticket” at your expense.
Passwords
 There are a number of password management
applications out there that will generate strong
passwords for you.
 Your only requirement is to remember the
password that gets you access into that
application.
 Through Managed IT Services, password
updates and changes will be proactively
managed by your provider for security
purposes.
Security Updates
Since most operating system and browser
updates include security updates, always update
your software. By doing so, you will make it that
much harder for an intruder to break through
when your applications are up to date.
Keep Your Wits About You
 Use common sense when responding to emails.
 How many times has a personal friend emailed you to obtain your personal passwords and
login credentials? Probably never.
 If there is something suspicious about an email you received, reach out to your friend,
company, or senior executive that sent it to you.
 Do not feel pressured to provide personal information even if they are playing on your
emotions.
 Always be suspicious of unsolicited email even if it comes from you CEO.
Google
Yourself
 See firsthand how much
information is out there on the
Internet about you. Don’t forget
any posts that you may made on
other people’s pages or company
updates on LinkedIn. Is there
enough information out there that
a phisher or whaler can scam you?
Manage your inbox with caution. Hacking techniques will continue to get
more sophisticated in nature, which is putting all businesses at risk. If you
are not satisfied that your organization is secure or would be able to
respond to an attack, contact us. We have helped businesses like yours
respond in times of crisis and put processes in place to guard against such
attacks.

Weitere ähnliche Inhalte

Was ist angesagt?

Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
Ernest Staats
 
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing EmailsAnalyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Cybersecurity Education and Research Centre
 

Was ist angesagt? (19)

[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
RP Phishing Awareness
RP Phishing Awareness RP Phishing Awareness
RP Phishing Awareness
 
Phishing
PhishingPhishing
Phishing
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing EmailsAnalyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online
 
Facebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook AccountFacebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook Account
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | Edureka
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Social Engineering CSO Survival Guide
Social Engineering CSO Survival GuideSocial Engineering CSO Survival Guide
Social Engineering CSO Survival Guide
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 

Ähnlich wie Are Phishing Attacks Angling For You?

phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
amby3
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
Payza
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
ErrorError22
 

Ähnlich wie Are Phishing Attacks Angling For You? (20)

IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Phishing
PhishingPhishing
Phishing
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
Phishing
PhishingPhishing
Phishing
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Data Security: A Guide To Whale Phishing
Data Security: A Guide To Whale PhishingData Security: A Guide To Whale Phishing
Data Security: A Guide To Whale Phishing
 
Common Email Security Mistakes
Common Email Security MistakesCommon Email Security Mistakes
Common Email Security Mistakes
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 

Mehr von The TNS Group

Mehr von The TNS Group (20)

Your Phone System Remains Important for Business—Here’s Why.pdf
Your Phone System Remains Important for Business—Here’s Why.pdfYour Phone System Remains Important for Business—Here’s Why.pdf
Your Phone System Remains Important for Business—Here’s Why.pdf
 
How to Interview Your Prospective IT Provider.pdf
How to Interview Your Prospective IT Provider.pdfHow to Interview Your Prospective IT Provider.pdf
How to Interview Your Prospective IT Provider.pdf
 
6 Indicators That Your Current IT Solution Needs an Overhaul
6 Indicators That Your Current IT Solution Needs an Overhaul6 Indicators That Your Current IT Solution Needs an Overhaul
6 Indicators That Your Current IT Solution Needs an Overhaul
 
Holiday Cybersecurity Tips
Holiday Cybersecurity TipsHoliday Cybersecurity Tips
Holiday Cybersecurity Tips
 
Top 10 Cybersecurity Tips of 2022
Top 10 Cybersecurity Tips of 2022Top 10 Cybersecurity Tips of 2022
Top 10 Cybersecurity Tips of 2022
 
Benefits of an MSP: Increased Profitability
Benefits of an MSP: Increased ProfitabilityBenefits of an MSP: Increased Profitability
Benefits of an MSP: Increased Profitability
 
Cybersecurity and the Shipping Industry
Cybersecurity and the Shipping IndustryCybersecurity and the Shipping Industry
Cybersecurity and the Shipping Industry
 
Top Tech Trends of 2020
Top Tech Trends of 2020Top Tech Trends of 2020
Top Tech Trends of 2020
 
How Office 365 can Save Thanksgiving
How Office 365 can Save ThanksgivingHow Office 365 can Save Thanksgiving
How Office 365 can Save Thanksgiving
 
Construction: Protect Your Assets From Ground-Breaking Threats
Construction: Protect Your Assets From Ground-Breaking ThreatsConstruction: Protect Your Assets From Ground-Breaking Threats
Construction: Protect Your Assets From Ground-Breaking Threats
 
Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?
 
Distribution Industry: Hardware Infrastructure Upgrades
Distribution Industry: Hardware Infrastructure UpgradesDistribution Industry: Hardware Infrastructure Upgrades
Distribution Industry: Hardware Infrastructure Upgrades
 
Healthcare Industry: Updates and Upgrades
Healthcare Industry: Updates and UpgradesHealthcare Industry: Updates and Upgrades
Healthcare Industry: Updates and Upgrades
 
Data Security: Are you Protected?
Data Security: Are you Protected?Data Security: Are you Protected?
Data Security: Are you Protected?
 
IT Consultng
IT ConsultngIT Consultng
IT Consultng
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Infrastructure and Desktop Support
Infrastructure and Desktop SupportInfrastructure and Desktop Support
Infrastructure and Desktop Support
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Managed Services: Cloud Infrastructure
Cloud Managed Services: Cloud InfrastructureCloud Managed Services: Cloud Infrastructure
Cloud Managed Services: Cloud Infrastructure
 
Maritime Shipping: Industries we Serve
Maritime Shipping: Industries we ServeMaritime Shipping: Industries we Serve
Maritime Shipping: Industries we Serve
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Are Phishing Attacks Angling For You?

  • 1. Are Phishing Attacks Angling for You?
  • 2. Phishing Phishing is similar to an online con game where attackers send fraudulent email messages appearing to come from trustworthy sources to gain personal information. These types of scams vary in their complexity and their attacker’s objectives, with spear phishing and whaling attacks being the more sophisticated forms of phishing.
  • 3. Phishing Gone are the days when spear fishing meant “what you do while vacationing in the warm waters of the Caribbean.” On that same note, “whaling” has nothing to do with the mammals nor one’s ability to have a “whaling good time.” Now the terms are synonymous with being aware of what comes through your inbox.
  • 4. Rise in Phishing Attacks Phishing attacks have been steadily rising and are increasingly targeting businesses. According to Verizon’s Data Breach Investigations Report released last year, 23% of recipients open phishing messages and 11% of those people open the links within these emails. Furthermore, 50% of these recipients open and click within the first hour. Email filtering can catch some phishing attempts, but not all, due to the rate at which these emails are opened.
  • 5. Spear Phishing Spear phishing is directed at individuals and whaling attacks are directed at senior level executives, also known as the “big phish,” who have access to valuable information within a business or organization. These attacks may occur utilizing a malicious email that appears to come from a company executive.
  • 6. What is Spear Phishing? Spear Phishing is a scam and you are the target. It is an email that appears to come from a business or someone that you know, but in reality, it is malicious in form and seeks to obtain sensitive information (bank account numbers, passwords, financial information, etc.).
  • 7. What is Spear Phishing? The spear ‘phisher’ thrives on all there is to know about you. They research job titles, partner information, company background, LinkedIn accounts and personal social media outlets to entice you into opening their emails. Just take a moment to think about how much information is available about you on the Internet. Did you take pictures from a recent trip to Paris and share them on Instagram; run a half- marathon where your name and completion time are easily accessible; or simply post the College that you graduated from?
  • 8. What is Spear Phishing? Once the spear phisher has this information – game on! The next email to you will probably use your first name, reference a “mutual friend,” how great you looked in Paris, and congratulate you on finishing first in your age group.
  • 9. What are Whaling Attacks?  Whaling attacks are the “it” hack of 2016. Whaling uses e-mail sent from spoofed or similar-sounding domain names to make it appear as though these emails were sent from senior executives of a victim’s company.  This requires targeted research focused on the identity of an employee and the organizational hierarchy within a company. This outreach is less personal in nature.  Whaling emails may be more difficult to detect because they don’t contain hyperlinks or a malicious attachment, they rely solely on tactics that depend on human interaction and to manipulate their targets.
  • 10. What are Whaling Attacks? According to the security firm, Mimecast, around 55% of organizations have seen an increase in whaling attacks over the last three months. Their research further suggests that in 72% of the cases whaling emails appeared to be sent by the CEO of the company, while 36% seemed to come from the CFO.
  • 11. What are Whaling Attacks?  Whaling attacks have been identified by hackers as the “golden goose.” If you receive a branded “company” email that promises reduced costs for pet insurance, be careful about opening any links or any attached forms–especially if you just welcomed a brand new Labrador Retriever puppy into your life.  These links may contain malware that opens up the gates of your corporate network.
  • 12. What are Whaling Attacks?  To avoid these damaging attacks, below are three helpful guidelines to help you stay protected. You may also contact your IT Security Provider for more information.
  • 14. The Sender Always pay attention to who the email comes from. If you are not familiar with the business or person it is from, you might not want to open. If you do open it, avoid clicking on any links until you can verify the identity of the sender. If it comes from your CEO, you are still not in the clear. Check the URLs to make sure everything is legitimate. If you are the only one being offered pet insurance in the company, you know there is a problem.
  • 15. The Sender The subject line might help in determining whether or not the email is malicious. However, we do heed caution especially if the subject references an purchase like, “Thank you for your recent iTunes purchase” as an example.
  • 16. The Content As phishing gets more sophisticated, this may come less into play. However, read through the to ensure that everything is spelled correctly, written in a clear manner, etc. These are telltale signs that the email may not have come from trusted source. Very rarely will you receive emails from a C-level executive within your firm sending emails that are not grammatically correct.
  • 17. The Call to Action  If you ever receive an email asking that you send personal information, login credentials or open an attachment – don’t do it. Is there a moment where you would actually contemplate giving out your social security number via email these days?
  • 19. Social Media Button up personal information that is living on the Internet. If you don’t, spear phishers have access to your friends list, email address, posts showcasing your Apple watch, etc. Keep as much information as possible restricted by customizing your security settings. The less information out there about you, the less you are a spear phisher to go by.
  • 20. Social Media In addition, don’t sign up for apps through social media unless it is reputable. Every time you enter your information is another opportunity to be hacked.
  • 21. Passwords Think about your passwords. Is it your birthday that is listed on your social media site? Or another date of significance? Do you use one or variations of that one? What about “123456” or “password”, the two most commonly used and easily hackable passwords other there. Click here for more information on what makes a good password.
  • 22. Passwords Every password for every site should be different, really different and should include multiple characters. If you follow these rules, please do not keep a standing list on the note section of your iPhone. If your iPhone gets stolen, not only did they get a new device but, more importantly, that device has just become their “golden ticket” at your expense.
  • 23. Passwords  There are a number of password management applications out there that will generate strong passwords for you.  Your only requirement is to remember the password that gets you access into that application.  Through Managed IT Services, password updates and changes will be proactively managed by your provider for security purposes.
  • 24. Security Updates Since most operating system and browser updates include security updates, always update your software. By doing so, you will make it that much harder for an intruder to break through when your applications are up to date.
  • 25. Keep Your Wits About You  Use common sense when responding to emails.  How many times has a personal friend emailed you to obtain your personal passwords and login credentials? Probably never.  If there is something suspicious about an email you received, reach out to your friend, company, or senior executive that sent it to you.  Do not feel pressured to provide personal information even if they are playing on your emotions.  Always be suspicious of unsolicited email even if it comes from you CEO.
  • 26. Google Yourself  See firsthand how much information is out there on the Internet about you. Don’t forget any posts that you may made on other people’s pages or company updates on LinkedIn. Is there enough information out there that a phisher or whaler can scam you?
  • 27. Manage your inbox with caution. Hacking techniques will continue to get more sophisticated in nature, which is putting all businesses at risk. If you are not satisfied that your organization is secure or would be able to respond to an attack, contact us. We have helped businesses like yours respond in times of crisis and put processes in place to guard against such attacks.