Phishing Emails : Every Employee Should Be Aware Of!

Ruchika Tyagi Mon, 05/18/2020 - 12:41

Phishing emails is a method used to compromise the end users’ computers to gain access into the network or to steal sensitive information. This is done by sending employees a fake email (called a phishing emails), that tries to dupe the employees into sharing confidential information such as bank account details, login names and passwords etc.  The phishing emails would appear to be from a trustworthy source. For instance, from his bank requesting to verify some information on a web link. Even though the mail seems to have come from the bank, but it is not. It redirects the user to a different website – not to the bank’s website.  Although, the domain name looks similar (but it is not the same), and when the user enters data there, this allows the hacker to gain access to the credentials to the user’s computer or network. Alternatively, the web link may contain the malicious code meant to gain access to the computer or & to the network by linking it to a command & control centre operated by the hacker.

One type of phishing attacks is a Spear Phishing attack. It’s a targeted attack in which a hacker or attacker researches on the victim and sends what seems to be the relevant information in the email which makes it look more legitimate, trustable. For example, it might contain details of transactions or business meetings or other such data. The email would include content which asks the person to take some action – like transferring money, or sharing credentials etc. This is particularly difficult to detect as often there is no attachment or link to check. The Radicati Group have estimated that around 3.2 billion people send around 269 billion emails every single day and some percentage of those are phishing emails. The Coronavirus situation has also seen a spike in the number of phishing emails.

The Major reason why Phishing attacks succeed, is that the users are not educated. They click on the link or attachment in the email without checking if it is legitimate.  If there are 100 employees in a company, all the hacker needs, is for one of them to click on the attachment or link – and provide the data to gain his access. Compromised credentials are the main reason behind various cyber-attacks. Phishing attacks are the way by which the credentials are obtained.

Different Types of Phishing Attacks

  1. Spoofing the sender address in an email which looks like it has been sent from a known source – and requesting sensitive information.
  2. Embedding a link in an email that looks like it originates from a trustworthy source. But the link takes the user to a malicious site.
  3. When the user clicks on the link or attachment in the email, a Trojan is installed, which allows the hacker to exploit vulnerabilities and get access to sensitive information.
  4. Attempting to get company information over the phone by introducing themselves as a known company vendor or the IT department.

Over the years phishing attacks have cost millions to organizations in terms of monetary and reputational loss, hence it is worthwhile to see how they can be prevented.

Few Steps to prevent phishing attacks:

  1. Educate the employees by giving training to increase security awareness –
  2. Ask your employees to make sure they check URLs properly – Open only https URL, if it is a financial transaction.
  3. Specifically, direct them not to open attachments in emails from unknown sources;
  4. Implement spam filters to recognise & block spam and phishing emails.
  5. Single sign-on & strong authentication will prevent the hackers from accessing confidential information even if the credentials are compromised.
  6. Internet browser add-on & extensions should be visible so that users can be alerted of suspicious activities.
  7. Keep all systems up to date with the latest updates & patches.
  8. Installing & monitoring antivirus software on all systems.
  9. Instruct users to change their password regularly.
  10. Implement Web filtering to block malicious websites.
  11. Encrypt the sensitive information, so that even if hackers get access to the computer or network, they will not be able to access the information.
  12. Protecting the corporate directory which includes name, email id & other personal information of employees. This is important mainly in the case of BYOD – apps on employee’s mobile devices, which can access their address book & can export them to external sources. Therefore, installing mobile security on the user devices is important.
  13. Remote users should be connected over VPNs (Virtual Private Networks).
  14. Testing employee awareness with fake phishing emails campaign at regular intervals. This will identify vulnerable employees for further training.
  15. Monitor the network – both incoming and outgoing traffic for anomalies and threats.
  16. Conducting periodic Penetration Testing.

Finally, the main issue is – are you regularly monitoring the activities on your network? Continuous monitoring will help in detecting any abnormal activity and raise alerts. More advanced analysis can be done using data correlation provided by the SIEM (Security Information & Event Management) Solutions.

Hence, sound security policies blended with the right product & security awareness training is the most successful combination to prevent phishing attacks. Teceze helps in providing consultancy & Managed services in all these areas, including leveraging our SOC that is built on the AlienVault SIEM platform.

The only way to protect what you’ve worked hard to build is to be vigilant when it comes to cybersecurity. If you’d like to know more about how your business can benefit from managed services, just give us a call, we are here to help.

Phishing emails usually appear to come from a well-known organization and ask for your personal information such as credit card number, or password.

Recent Post

Best Practices Moving Workloads to the Cloud Securely

Swami Nathan Mon, 10/11/2021 - 08:58

A growing number of businesses and organisations see shifting some of their IT workloads to the public cloud as not just a smart decision, but also a critical component of their overall IT strategy.

What is to be done if your laptop is stolen?

Swami Nathan Wed, 09/15/2021 - 05:36

It can be a terrible experience to have your laptop stolen. Someone else might potentially acquire access to your entire life, given everything we carry on our phones these days.

Cyber Security Tactics to Protect the Cloud

Swami Nathan Fri, 08/20/2021 - 08:09

The tactics and technologies used to safeguard cloud computing infrastructures from both external and internal cyber-attacks are referred to as cloud security.