What is Phishing and what can you do to prevent it?
Phishing is a type of online scam where criminals send an email that appears to be from a legitimate company and ask you to provide sensitive information. A Phishing email will typically direct the user to visit a website where they are asked to update personal information, such as a password, credit card, social security, or bank account numbers, that the legitimate organization already has
How to recognise a phishing email?
•Unofficial "From" address. Check for addresses which are similar but not exactly the same as the official address
•Urgent action required. Fraudsters will often put a sense of urgency into emails
•Link to a fake web site via instant message, often by someone who you do not know
•Check the Web address. If you are unsure about a website, the best is not to sign in
•Generic greeting. Fraudsters often send thousands of phishing emails at one time. They may have your email address, but they seldom have your name. Be skeptical of an email sent with a generic greeting such as "Dear Customer" or "Dear Member".
Also check out for the following additional indicators that might suggest an email is not trustworthy:
•Spelling errors, poor grammar, or inferior graphics.
•Requests for personal information such as your password, Social Security number, or bank account or credit card number. Legitimate companies will never ask you to verify or provide confidential information in an unsolicited email.
•Attachments (which might contain viruses or keystroke loggers, which record what you type).
Did you know that 91% of corporate successful data breaches started with a spear phishing attack?
You can find out what percentage of your employees are Phish-prone with a free phishing security test. Plus, see how you stack up against your peers with the new phishing Industry Benchmarks.
IT pros have realized that simulated phishing tests are urgently needed as an additional security layer. Today, phishing your own users is just as important as having antivirus and a firewall. It is a fun and an effective cybersecurity best practice to patch your last line of defense: USERS
Why? If you don't do it yourself, the bad guys will.
Here's how it works:
•Immediately start your test for up to 100 users (no need to talk to anyone)
•Customize the phishing test template based on your environment
•Choose the landing page your users see after they click
•Show users which red flags they missed, or a 404 page
•Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
•Train these users that clicked into the phishing links
For more information, call The Techforce on 0044 (0) 333 210 6181
- Protecting your identity online
- What is a VPN and why do you need one?
- Quick tips to improve your board’s cybersecurity
- Password Management Software
- How to make of your employees the best line of cyber defence against cyberattacks
- Certificate management processes
- Found malware, now what do you do?
- Data breaches and other scary 2019 events- Special Halloween post
- How to get your cyber security budget approved by the board
- The TechForce Sponsorships
- How to start a career in the security industry
- Protecting your business in the cyber security era
- Secure Your Supply Chain
- Case study: British Airways Fined £183.4million for Data Breach
- The Silver Bullet in Cyber Security
- Fake invoice email scams and Office 365
- How to apply for the Cyber Essentials Voucher Scheme
- What is Business Email Compromise (BEC) and how to stop it
- Everything you need to know about Cyber Essentials
- Cyber Essentials Demystified
- How to choose a Security Awareness Platform
- 6 Quick and Easy Email Security Tips for Dummies
- Hackers On Tour
- How to share passwords safely in your Small Business
- In the news - Warning. North Sea firms likely already attacked
- 10 Steps to Cyber Security
- 6 Top Tips to Prevent Cyber Attacks
Protecting your identity online
Is it possible to really protect your identity online? How do “you” protect your identity online and how do others that have your identification details protect you in the ever expanding “online” aspect of computing?More
What is a VPN and why do you need one?
We tell you in this post why it is useful to have a VPN connectionMore
Quick tips to improve your board’s cybersecurity
For some CISOs, it is a challenge to communicate your priorities to the board. We provide you here with some quick tips to ensure your board knows more about cybersecurity and how to act upon it.More
Password Management Software
Remembering passwords is hard, we tell you how to store and share passwords safely with password management softwareMore
FOR LATEST UPDATES SUBSCRIBE HERE: