Sponsored By

Opening Emails Has Never Been So Scary

Organizations should have an email security solution that automatically detects and blocks advanced targeted spear phishing attempts.

September 7, 2018

3 Min Read
Man sitting at computer

Cybercriminals are continually honing their skills to find ways to get in your inbox and get you to unknowingly click on a malicious link.

Enter spear phishing.

Similar to phishing, where malicious actors attempt to trick their victims into sharing private data and credentials through blanket attempts to access databases, spear phishing is after the same information. However, spear phishing goes about it in a more personal way.

Cybercriminals looking for spear phishing victims begin by trying to obtain as much personal information about potential victims as possible. By doing their research, these cybercriminals can then craft individual, personalized emails–making the emails look more credible and increasing the likelihood of catching the victim.

These more sophisticated techniques target a specific individual or group with some sort of “individualized” details in the message. Because of the trust factor of personal emails, it is more difficult for recipients to identify spear phishing attacks.

And while these attacks are duping users, it is even more concerning that traditional filtering techniques struggle to correctly flag spear phishing attempts.

To help protect themselves from falling victim to these types of attempts, organizations should have an email security solution that automatically detects and blocks advanced targeted spear phishing attempts. Organizations are also strongly advised to secure their network with a multi-layered approach–combining email and web security solutions with an endpoint AV protection layer.

Organizations should also consider conducting regular IT security audits to get a clear picture of the status of the network, become more aware of the security holes, and learn how to best deal with those threats.

Here are some best practices to help keep your employees safe from a spear phishing attack:

Create strong, complex passwords: Passwords should be between 8 and 12 characters with a combination of upper and lowercase letters, numbers and symbols. Never use the same password for different accounts. A password manager can also help by managing multiple accounts and suggest strong password options.

Careful clicking: Only click web links within emails you know to be authentic. If an organization, such as your bank, asks you to perform any activity that involves clicking links and entering credentials, either launch your browser and go directly to the bank’s site or call them to double check on it. It’s best to always assume the worst when it comes to following links.

Employee training: Employees are typically the last line of defense when it comes to protecting an organization’s network against a malicious attack. By implementing training on security awareness and social engineering techniques, users will be equipped to make better judgments about the content they download from the internet, receive through communications and access through the Web.

Google yourself: Be cautious when sharing data on social networks and limit what types of personal information you post on the internet: Review your online profiles and ask yourself how much personal information is available for cyber criminals to view? If there is anything that you do not want a potential scammer to see, do not post it. You should also consider reviewing your privacy settings on social media sites.

Want to know more about spear phishing? Download AppRiver’s free whitepaper, Spear Phishing: Understand, Analyze and Prevent Spear Phishing: Understand, Analyze and Prevent.

This guest blog is part of a Channel Futures sponsorship.

Read more about:

AgentsMSPsVARs/SIs
Free Newsletters for the Channel
Register for Your Free Newsletter Now

You May Also Like