Jump to content

Avoid Phishing Attacks: Difference between revisions

no edit summary
No edit summary
Line 21: Line 21:


== Four Steps to Protect Yourself From Phishing ==
== Four Steps to Protect Yourself From Phishing ==


#Protect your computer by using security software like [[Use Sophos Endpoint|Sophos Endpoint]]. Set the software to update automatically so it can deal with any new security threats.
#Protect your computer by using security software like [[Use Sophos Endpoint|Sophos Endpoint]]. Set the software to update automatically so it can deal with any new security threats.
Line 33: Line 32:
== What to do if you suspect a phishing attack? ==
== What to do if you suspect a phishing attack? ==
[https://support.google.com/mail/answer/1366858?co=GENIE.Platform%3DDesktop&hl=en Mark the email as Spam], and delete.
[https://support.google.com/mail/answer/1366858?co=GENIE.Platform%3DDesktop&hl=en Mark the email as Spam], and delete.
== What is "Spear Phishing" ==
Spear phishing is an email or electronic communications scam targeted towards a specific individual, school or business. Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user’s computer.
== How does "Spear Phishing" work? ==
An email arrives, apparently from a trustworthy source, but instead it leads the unknowing recipient to a bogus website full of malware. These emails often use clever tactics to get victims' attention.
== How to protect yourself from spear phishing ==
Traditional security often doesn't stop these attacks because they are so cleverly customized. As a result, they're becoming more difficult to detect. One employee mistake can have serious consequences. With stolen data, fraudsters can reveal sensitive information. In addition, spear phishing attacks can deploy malware to hijack computers, organizing them into enormous networks called botnets that can be used for denial of service attacks.
To fight spear phishing scams, employees need to be aware of the threats, such as the possibility of bogus emails landing in their inbox.
2,227

edits