When providing education on phishing, we tell employees to delete e-mails with attachments from unknown sources because of the potential for malware to infiltrate your network. However, there may be some cases where this would negatively impact business. Let’s look at a scenario where e-mails with attachments from unknown senders are a normal part of business operations. Perhaps you’re responsible for hiring and ask people to e-mail their resumes to you. Or, because you’re a hiring manager or in HR, people send you resumes out of the blue. How do… Read more But… I expect e-mails from new people all the time. →
This is not a commentary on the holiday season, rather a teaching moment for phishing. During the holidays, people turn to online shopping for incredible deals and the convenience of… Read more It’s the Most Scam-Ridden Time of the Year →
Looking at the recent political news, it appears hackers targeted John Podesta, Hillary Clinton’s Campaign Chairman, in order access to his and other DNC staffers’ e-mail accounts. Regardless of your political beliefs, this is a teaching moment: Podesta, a high profile figure, has had his personal e-mails leaked online. Everyone with whom he communicated via that hacked e-mail account is also in the spotlight (including the President whose personal e-mail address was revealed). It appears that Podesta was spearphished. According to reports, hackers sent him a carefully crafted e-mail containing… Read more Use the DNC Hacks to Teach Phishing →
The Verizon 2016 Data Breach Investigations Report (DBIR) again highlights phishing as a successful attack vector with 30% of people opening phishing e-mails and 13% opening attachments, often within the… Read more The Unexpected E-mail Needs More Scrutiny →