Don’t believe everything you see
Phishers are becoming more and more adept and sophisticated at making emails look like they are from the company they are trying to replicate. Brand logos, language, and a valid email address don’t mean that an email is legitimate. If something looks odd or differs from the usual, then be extremely cautious. Most companies have an email address you can forward suspicious emails to anything out of the ordinary to work email address account you should always forward to your IT team.
Look but don’t click
The sender name might be valid, but it could still be a spoof the best way to check is to hover your mouse over any links embedded in the body of the email. If the link address looks weird, don’t click on it. If you want to test the link, open a new window and type in the website address directly rather than clicking on the link from unsolicited emails.
Does the greeting make sense?
“Valued Customer” or “Dear Mr_Brown@hotmail.co.uk” is not usually how your bank will start a communication with you. Legitimate businesses usually use your first name and some other type of identifiable information.
Don’t give out personal information
Legitimate businesses won’t ask for personal information via email. Phishing emails are designed to incite panic and trick you into giving out your personal details or transferring money. Be aware of threatening or urgent language in emails “respond now to prevent your account being blocked” or “Act now” this is not how a business would not communicate with you.
The more senior you are the more at risk you are
Key decision makers and senior business people are more susceptible to be being victims of social engineering.
Social engineering attacks typically involve some form of psychological manipulation, fooling otherwise unsuspecting users or employees into handing over confidential or sensitive data. Commonly, social engineering involves email or other communication that invokes urgency, fear, or similar emotions in the victim, leading the victim to promptly reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, preventing these attacks can be tricky for enterprises. Please watch this informative video for a complete understanding of how these attacks work.
These types of emails usually contact templates of text or links that lead to lead to fake pages. Check hyperlinks by right clicking (not left click as it might open the link) and check the view source option the hyperlink URL with start with http:// you can often tell by looking at the real URL if a link is unsafe.
KubeNet offers businesses of all types a cyber security solution that blocks most fraudulent emails and malware attacks from ever reaching your inbox – Cisco Umbrella.
Intelligence feeds from Cisco Talos and AMP integrate with Umbrella and means that constant analysis of millions of malware samples and terabytes of data to block malicious content.
Umbrella is so sophisticated that it can even identify any URLs that went live a few hours ago to highlight possible scams and it protects your devices even when they aren’t connected to the network. So if your use a company laptop on your home Wi-Fi when working from home, you’re protected.
Try it FREE for 21 days, you’ll be surprised at what it blocks. This FREE assessment lets you know how at risk your business is.
Get in touch now, Cisco Umbrella protects your entire business in minutes call 0800 668 1266 or email email@example.com