
Pishing & Whaling
PHISHING WHALING HOW BUSINESSES CAN OUTSMART A DIGITAL THIEF Careful, the next email you click on could lead to cyber crime and its costly consequences. Cybercriminals are becoming increasingly adept at hiding malicious attack tools. THE BAIT Professional looking emails designed to trick individuals and businesses into providing sensitive information. THE IMPACТ" 156 80,000 PEOPLE MILLION phishing emails sent fall victim to these scams THE SCHEMES DEFINED 2* PHISHING When digital thieves steal information by posing as a legitimate entity. WHALING When the victim is a high-profile individual WHY IT WORKS EMAILS LOOK LEGITIMATE AND ARE PERSONALIZED SOME EMAILS USE FEAR TACTICS OR URGENCY TRIGGERS LIKE RECALLS OR HEALTH CONCERNS TO MAKE READERS ACT FAST EMPLOYEES LACK KNOWLEDGE TO SPOT FRAUDULENT EMAILS The 2015 Verizon Data Breach Investigation Report found that 23% of recipients open phishing emails and 11% open the attachments. 56 TYPES OF EMAILS TO WATCH FOR’ TECHNICAL 21.3% look like error messages or account updates CORPORATE 15.3% look like professional business email COMMERCIAL 12.9% PRECAUTIONS EVERY BUSINESS SHOULD TAKE * look like social media notifications or donation requests INSTALL SOFTWARE EDUCATE EMPLOYEES CONSULT WITH OR THAT REQUIRES EMPLOYEE AUTHENTICATION TO CYBERSECURITY ACCESS OR TRANSFER INSTALL TOP-OF-THE-LINE PROFESSIONAL TO MONEY ANTI-VIRUS, ANTI-MALWARE SOFTWARE MAXIMIZE SAFETY 3500 BUSINESSES $370 ARE VICTIMIZED YEARLY, RESULTING IN LOSSES OF MILLION RISING CYBERCRIME, GROWING NEEDS THERE ARE 209,000 UNFILLED POSITIONS IN THIS FIELD 10 POSTINGS HAVE SKYROCKETED BY 74% A 2016 STUDY OVER THE PAST FOUND THAT 5 YEARS -82% OF IT DECISION MAKERS SAID THEY HAD A SHORTAGE OF CYBERSECURITY SKILLS IN THEIR ORGANIZATIONS". YOU CAN STOP CYBER CRIMINALS A DEGREE IN CYBERSECURITY FROM UTICA COLLEGE IS THE FIRST STEP. [LEARN HOW TODAY] Utica College offers degree programs in Cybersecurity, which offer the skills needed to pursue a career in this fast-paced and demanding field. UTICA COLLEGE 'Phishing: Why Take the Bait. Get Cyber Safe. http://www.getcybersafe.gc.ca/cnt/rsrcs/nfgrphcs/nfgrphcs-2012-10-11-en.aspx 2 What is Phishing? Microsoft. https://www.microsoft.com/en-us/safety/online-privacy/phishing-symptoms.aspx Whaling: Why go after Minnows When You Can Catch Big Phish. Social Engineer. https://www.social-engineer.com/whaling-why-go-after-minnows-when-you-can-catch-a-big-phish/ * Why Phishing Works. Security Week. http://www.securityweek.com/why-phishing-works-and-how-avoid-becoming-victim * https://msisac.cisecurity.org/whitepaper/documents/1.pdf * https://www.shredit.com/en-us/blog/securing-your-information/march-2016/email-fraud-would-your-employees-recognize-these 7 Impact Phishing has on Business. Wombat Security. https://info.wombatsecurity.com/blog/infographic-what-impact-does-phishing-have-on-your-business " Why Phishing Works. Security Week. http://www.securityweek.com/why-phishing-works-and-how-avoid-becoming-victim * Business Email Compromise. FBI. https://www.fbi.gov/news/stories/2015/august/business-e-mail-compromise/business-e-mail-compromise 10 One million Cybersecurity Jobs open in 2016. Forbes. http://www.forbes.com/sites/stevemorgan/2016/01/02/one-million-cybersecurity-job-openings-in-2016/#4640a73b7d27 " http://www.fastcompany.com/3062210/the-future-of-work/the-most-critical-skills-gap-cybersecurity
Pishing & Whaling
Source
Unknown. Add a sourceCategory
ComputersGet a Quote