Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - Talk nerdy to me.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Visual C++ Redistributable Runtimes AIO Repack
5. Visual C++ Runtime Installer (All-In-One)
6. McAfee Removal Tool (MCPR)
7. MusicBee
8. Rufus
9. K-Lite Mega Codec Pack
10. Sergei Strelec's WinPE
More >>

top reads

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Aviator Betting Game Secrets: Unlock 97% RTP & Triple Your Wins

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How To Use VLC Media Player to Trim Video Clips

Star What Is the $WinREAgent Folder and Can I Delete It?

Star Swear Your Way to Better Search Results

Star How to Get a Dark Start Menu and Taskbar in Windows 10 & 11

Star Enable, Disable, Manage, Delete or Create a System Restore Point


MajorGeeks.Com » News » November 2015 » Mitigate Phishing Attacks

Mitigate Phishing Attacks


Posted by: Timothy Weaver on 11/04/2015 10:21 AM [ comments Comments ]


Plenty of cyber attacks can be traced back to a phishing scam, esp. the high profile ones. The scams aim to steal personal information and employee credentials or to plant malware on their system.

As noted in the 2015 Verizon Breach Investigation Report, creating a network of “human sensors” through internal education can be just as effective as almost any technology at detecting phishing attempts.

Training should consider these four warnings:

1.Context – Understanding the context of an email can help determine whether it is from a legitimate source. Make sure to consider any email before opening.
2.Content – It is crucial to understand the origin of a hyperlink before clicking on it, especially if any part of it is misspelled. Think Faecbook.com vs. Facebook.com.
3.Composition – Usually this will be an important indicator of where or from who this email might originate. For example, if a bank sends an email with no logo, no signature and in plain text, it might be cause to give them a call.
4.Communicator – Even if a message comes from a known sender, it is necessary to thoroughly look through the email for the above signs, as some hackers might even have information about people in your network (based on details obtained through of social networks, etc.).

Employees need to remember that any public information can be used against a victim. Use caution when posting on social networks. So it is important to remind employees that their Internet footprint can have a serious impact on security.

Source: SCMagazine


« Ransomware Threatens to Expose Private Data · Mitigate Phishing Attacks · New on MajorGeeks: Windows Update MiniTool »




Comments
comments powered by Disqus

MajorGeeks.Com » News » November 2015 » Mitigate Phishing Attacks

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition