2,234
edits
Line 38: | Line 38: | ||
An email arrives, apparently from a trustworthy source, but instead it leads the unknowing recipient to a bogus website full of malware. These emails often use clever tactics to get victims' attention. | An email arrives, apparently from a trustworthy source, but instead it leads the unknowing recipient to a bogus website full of malware. These emails often use clever tactics to get victims' attention. | ||
== How to protect yourself from spear phishing == | == How to protect yourself from spear phishing == | ||
To fight spear phishing scams, employees need to be aware of the possibility of bogus emails landing in their inbox. | To fight spear phishing scams, employees need to be aware of the possibility of bogus emails landing in their inbox. |
edits