Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Can please have a summary, not more than a paragraph. OUCH! Newsletter: Stop That Phish Translations DOWNLOAD Guest Editor Tonia Dudley Director, Security Awareness Overview

Can please have a summary, not more than a paragraph.

image text in transcribed

image text in transcribed

image text in transcribed

OUCH! Newsletter: Stop That Phish Translations DOWNLOAD Guest Editor Tonia Dudley Director, Security Awareness Overview Email and messaging services (such as Skype, Twitter, or Snapchat) are one of the primary ways we communicate. We not only use these technologies every day for work, but also to stay in touch with friends and family. Since so many people around the world depend on these technologies, they have become one of the primary attack methods used by cyber attackers. This attack method is called phishing. Learn what phishing is and how you can spot and stop these attacks, regardless if you are at work or at home. A diversified career spanning various finance roles for 14 years at a national automotive retail chain, transitioning into various IT roles over the next 12 years for a global manufacturing enterprise where she then developed an interest in Cybersecurity. What Is Phishing Phishing is a type of attack that uses email or a messaging service to fool you into taking an action you should not take, such as clicking on a malicious link, sharing your password, or opening an infected email attachment. Attackers work hard to make Subscribe to OUCH!, our Monthly Security Awareness Newsletter Get monthly content to keep you up to date on the latest Security Awareness News and Tips. What Is Phishing Phishing is a type of attack that uses email or a messaging service to fool you into taking an action you should not take, such as clicking on a malicious link, sharing your password, or opening an infected email attachment. Attackers work hard to make these messages convincing and tap your emotional triggers, such as urgency or curiosity. They can make them look like they came from someone or something you know, such as a friend or a trusted company you frequently use. They could even add logos of your bank or forge the email address so the message appears more legitimate. Attackers then send these messages to millions of people. They do not know who will take the bait, all they know is the more they send, the more people will fall victim. Protecting Yourself In almost all cases, opening and reading an email or message is fine. For a phishing attack to work, the bad guys need to trick you into doing something. Fortunately, there are clues that a message is an attack. Here are the most common ones: A tremendous sense of urgency that demands immediate action before something bad happens, like threatening to close an account or send you to jail. The attacker wants to rush you into making a mistake. Pressuring you to bypass or ignore your policies or procedures at work. . Pressuring you to bypass or ignore your policies or procedures at work. A strong sense of curiosity or something that is too good to be true. (No, you did not win the lottery.) . A generic salutation like Dear Customer. Most companies or friends contacting you know your name. . Requesting highly sensitive information, such as your credit card number, password, or any other information that a legitimate sender should already know. The message says it comes from an official organization, but has poor grammar or spelling or uses a personal email address like @gmail.com. . The message comes from an official email (such as your boss) but has a Reply-To address going to someone's personal email account. You receive a message from someone you know, but the tone or wording just does not sound like him or her. If you are suspicious, call the sender to verify they sent it. It is easy for a cyber attacker to create a message that appears to be from a friend or coworker. Ultimately, common sense is your best defense. If an email or message seems odd, suspicious, or too good to be true, it may be a phishing attack. Subscribe to OUCH! and receive the latest security tips in your email every month

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Concepts Of Database Management

Authors: Joy L. Starks, Philip J. Pratt, Mary Z. Last

9th Edition

1337093424, 978-1337093422

More Books

Students also viewed these Databases questions

Question

5. Develop the succession planning review.

Answered: 1 week ago