Jump to content

Avoid Phishing Attacks: Difference between revisions

No edit summary
Line 40: Line 40:
Traditional security often doesn't stop these attacks because they are so cleverly customized. As a result, they're becoming more difficult to detect. One employee mistake can have serious consequences. With stolen data, fraudsters can reveal sensitive information. In addition, spear phishing attacks can deploy malware to hijack computers, organizing them into enormous networks called botnets that can be used for denial of service attacks.
Traditional security often doesn't stop these attacks because they are so cleverly customized. As a result, they're becoming more difficult to detect. One employee mistake can have serious consequences. With stolen data, fraudsters can reveal sensitive information. In addition, spear phishing attacks can deploy malware to hijack computers, organizing them into enormous networks called botnets that can be used for denial of service attacks.


To fight spear phishing scams, employees need to be aware of the threats, such as the possibility of bogus emails landing in their inbox.
To fight spear phishing scams, employees need to be aware of the possibility of bogus emails landing in their inbox.
2,227

edits