by harviaadmin77

Share

by harviaadmin77

Share

It’s not just the bad actors that we at Core Security want to protect you from – we also want to protect you from yourself. It’s all hands on deck when it comes to securing your systems and the systems you interact with on a daily basis. Everyone personally has, on average, four devices to keep track of – all with different accounts (or even the same) on each with a plethora of passwords to remember all while trying to ensure you have the proper security measures in place to ensure the bad guys can’t get in.

All that is to say, you could have the right precautionary measures in place to help eliminate the number or size of security gaps within your organization – but all that could be for nothing if you simply open the wrong email.phishing tips to secure your network.

At the end of 2016, phishing emails were the cause of 91% of cyber attacks. And throughout 2017 we’ve seen that trend carry on as email remains the leader in the method in which adversaries infect devices and systems with malware. Just think back to a few months ago when Gmail users were targeted. This isn’t a tactic going away any time soon so it’s time to prepare and learn how to combat it.

Recently, the FBI published a list of ways to combat these attacks, increased awareness campaigns and response plans to phishing schemes from adversaries. Let’s look further into some of their suggestions:

Don’t use free web-based email accounts. This is just asking for trouble. With so many people able to access and obtain free web-domain email addresses it becomes a tall order for the providers to ensure everyone with an account is protected. If you are looking for an email domain to use for your employees, go ahead and purchase a domain associated with your business name.

Keep firewalls and virus software up-to-date and ensure they are as powerful as possible. Make sure you are downloading your security updates in a timely manner. Those programs push out updates for bug fixes and added layers of security so not taking the time to update your programs gives a playbook to bad actors who are trying to get their hands on your sensitive data.

Report and delete suspicious emails. Don’t open emails that you question – even in the slightest. It’s better to be safe than sorry. If you see something, say something. Even if it’s a false alarm, your IT and Security teams will be grateful that you are looking out for the betterment of your entire organization instead of just trying to sift through your emails as quickly as possible. In an earlier post, we mentioned companies like Melaleuca that place a premium on cyber security. One of the reasons the online Melaleuca reviews are so positive is because the company protects its electronic communications.

Encrypt your emails. This especially goes for if you are transferring sensitive information. Making sure the sensitive data you’re sharing with fellow colleagues or external personnel is safe is critical for all parties involved.

Though the tips may seem straight forward or simple, it really can be difficult to differentiate between what’s real and what’s being sent from an attacker. It all starts with increasing awareness and testing employees routinely so they are better able to differentiate between potential attacks and everyday emails.

If you’re looking for a tool to help train and test your employees to recognize the risky emails, speak with one of our security specialists today about Core Impact and how it can leverage you and your employees to combat the biggest threats out there.

STAY IN THE LOOP

Subscribe to our free newsletter.

Don’t have an account yet? Get started with a 12-day free trial

Related Posts

View all
  • One of the hottest debate topics in today’s COVID-19 world is the proper balance of public safety with personal privacy. The latest actor to take center stage in that discussion is “Artificial Intelligence”. With so much of the world still in quarantine, including law enforcement personnel, governments are turning to technology to help fill in […]

    Continue reading
  • Vulnerabilities Are On The Rise: Secure Your Business Now The reliance of businesses on data and information transmitted via cyberspace was never so high. While the data explosion has made organizations more effective and profitable, it has presented them with new security risks and challenges. Just as protecting your home against trespassers is important, securing […]

    Continue reading
  • Businesses are not prepared for advanced malware. This may seem like a harsh statement but as this week’s POS breach at Chipotle showed us, it is true. According to the 2017 Verizon Wireless Data Breach Report, over half (51%) of breaches included malware and 66% of that came through malicious email attachments. In the world […]

    Continue reading
  • Late last year the New York State of Financial Services (DFS) announced that New York would be proposing a “first in the nation” rule on cyber-security to go into effect on March 1, 2017 which would impact any bank, insurance company and anyone else covered by DFS. The rule requires any regulated company design a […]

    Continue reading