logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
19th July 2019 by CyberVision 0 Comments 758 Views
19th July 2019 by CyberVision in Business Security

How to protect against phishing attacks

Phishing and social engineering have become the main sources of all cyber security breaches with phishing using disguised emails as a weapon in the attacks. The attackers typically impersonate trusted entities, often a real person or company the victim might do business with, as part of their modus operandi. Their aim is to fool the email recipient into believing that the message they receive is something expected by them – such as a request from their bank or note from someone in their company. Getting the message recipient to then click on a link or download an attachment is what the attacker’s main aim is.

The simplest way to avoid phishing scams is to never click on a link in an email. If you get an email from a bank or your credit card company asking you to follow up on something, you should go directly to their secure website to do it. Alternatively, you should contact them by phone using a number provided on such a secure site. Phishing attacks are also often done using spam messages which have never gone away and continue to be one of the tools that criminals still rely on because they cost very little and yet yields results.

Employees are still falling for phishing scams though, no matter how much training they have been given in an attempt to counter this scourge. In the current threat landscape it is much more cost effective to focus on training those with access to critical assets in an organisation and having an incident response plan in place whilst strengthening internal controls as much as possible. Penetration-testing your organisation to find weak spots and using the results to educate employees also helps to promote a culture of more effective cyber security in the workplace.

And then while phishing is the primary cause for security breaches, managing and patching internal systems is just as important. Make sure you’re always running internet security software that scans the websites you visit to check their reputation, such as used by the Browsing Protection app in F-Secure SAFE. This solution helps to protect you from harmful websites, even if you click on the wrong things. Patching vulnerabilities as they are released also creates a hurdle for attackers and forces them to try harder methods of exploitation.

 

Both individuals and organisations are at risk these days and almost any kind of personal or organisational data can be considered valuable and at risk of being compromised by someone committing fraud and accessing an organisation’s network to obtain the information. Phishing attack protection requires steps be taken by both users and the IT staff at organisations. For individuals, vigilance and awareness is the key and users should always stop and think about why they’re receiving a particular email if it looks suspicious in any way.

 

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • cyber-security
  • cybervision
  • f-secure
  • phishing
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo