Recovering from a Phishing Attack

Recovering from a Phishing Attack

So you tried your best to avoid a phishing attack but one day your laptop woke up with the flu bug. Criminals use phishing attacks to try to get at your personal information. You receive a legitimate-looking email with a link or attachment attached and you take the bait. After the initial shock wears off what do you do?

First and foremost, disconnect your device immediately to get offline. The criminal could be in the process of installing ransomware on your computer. So if you have a wire connection, simply unplug the internet cable. If your device is wireless, disconnect it from the wifi network.

Continue reading “Recovering from a Phishing Attack” »

Attack on 2 Factor Authentication Highlights Phishing Protection Needs

Attack on 2 Factor Authentication Highlights Phishing Protection Needs

Two factor authentication (2FA) is supposed to make logins more secure. Using 2FA requires two private pieces of information to login: your password and one other, typically a code received via text message. The challenge is the more secure the approach seemingly is, the less attention you pay while logging in. And therein lies the problem.

Continue reading “Attack on 2 Factor Authentication Highlights Phishing Protection Needs” »

Combating the Threat of Phishing in the Modern Corporation

Combating the Threat of Phishing in the Modern Corporation

Phishing is possibly the single most dangerous form of cyber attack facing individuals and corporations in today’s world because it exploits people rather than systems. At a very high level, phishing is any form of attack that trades on the trust of a person or corporation to reveal some information they wouldn’t normally reveal.

Continue reading “Combating the Threat of Phishing in the Modern Corporation” »

Do I Need Third-Party Phishing Protection for Office 365?

Do I Need Third-Party Phishing Protection for Office 365?

Office 365’s security features won’t protect users from all cyber security threats.

Microsoft’s cloud-based Office 365 user base is growing at a steady rate. Since the office platform first outperformed Google Apps in 2015, it’s seen a constant uptick in activity.

Now, Microsoft reports it counts its Office 365 users in the hundreds of millions. However, enterprise usage does not always equal enterprise value – particularly when it comes to cybersecurity.

Continue reading “Do I Need Third-Party Phishing Protection for Office 365?” »

Can Phishing Awareness Training Cause More Harm Than Good?

Can Phishing Awareness Training Cause More Harm Than Good?

Filtering and time-of-click protection can produce results where training fails.

First, the facts: Employees who are unaware of the dangers of phishing are far more likely to become victims of phishing attempts than those who understand the process.

The FBI estimates that organizations across the United States lose $1.2 billion every year due to email scams. Since phishing is by far the most popular way to get malicious code into an organization’s network, it follows that training employees to recognize phishing attempts is an effective strategy for preventing phishing attacks.

Continue reading “Can Phishing Awareness Training Cause More Harm Than Good?” »