Do you need a Managed Services Provider? Comparing IT to an MSP. Proactive Planning. Predictable Budgeting.
3 Fundamentals for Shoring Up Phishing Defenses
In the past year, phishing and ransomware have exponentially become more and more apparent in the world of cybersecurity. Let's dive into it.
In the past year, phishing and ransomware have exponentially become more and more apparent in the world of cybersecurity. Bad actors are getting more brazen and bold with their tactics. Let's dive into one of the biggest concerns of 2021 with an article brought to you by the National Cyber Security Alliance (NCSA) and their 2021 campaign for Cybersecurity Awareness Month.
From ransomware to SolarWinds, the cybersecurity space has been as hectic as it has ever been over the last 12-24 months. However, for all of the emerging threats and news that are cropping up on the horizon, phishing -- one of the oldest pain points in cybersecurity -- is continuing to wreak havoc quietly and is as big of a threat as it has ever been.
Despite often being overlooked in terms of hype, phishing has been a mainstay in the cybersecurity threat landscape for decades. 43 percent of cyberattacks in 2020 featured phishing or pre-texting, while 74 percent of US organizations experienced a successful phishing attack last year alone. That means that phishing is one of the most dangerous “action varieties” to an organization’s cybersecurity health. As a result, the need for proper anti-phishing hygiene and best practices is an absolute must.
With that in mind, here are a few quick best practices and tips for dealing with phishing threats.
Want to know about other cybersecurity threats? Check out our other article on this year’s biggest topics.
Know the Red Flags
Phishes are masters of making their content and interactions appealing. It can be challenging to discern whether the content is genuine or a potential threat from content design to language, so it is vital to know the red flags. From awkward and unusual formatting to overly explicit call-outs to click a hyperlink or open an attachment, these are clear signs that the content you received could be potentially from phish and indicate that it should be handled with caution.
Verify the Source
Phishing content comes in a variety of ways; however, many phishers will try to impersonate someone you may already know -- such as a colleague, service provider, or friend -- as a way to trick you into believing their malicious content is trustworthy. Please don’t fall for it. If you sense any red flags that something may be out of place or unusual, reach out directly to the individual to confirm whether the content is authentic and safe. If not, break off communication immediately and flag the incident through the proper channels.
Be Aware of Vishing and Other Phishing Offshoots
As more digital natives have come online and greater awareness has been spread about phishing, bad actors have begun to diversify their phishing efforts beyond traditional email. For example, voice phishing -- or vishing -- has become a primary alternative for bad actors looking to gain sensitive information from unsuspecting individuals. Like conventional phishing, vishing is typically executed by individuals posing as a legitimate organization -- such as a healthcare provider or insurer -- and asking for sensitive information. Simply put, individuals must be wary of any communication that asks for personal information, whether via email, phone, or chat, especially if the communication is unexpected. If anything seems suspicious, again, break off the interaction immediately and contact the company directly to confirm the veracity of the communications.
Phishing may be “one of the oldest tricks in the book,” but it is still incredibly effective. And although it may be hard to spot when you may be in the midst of a phishing attempt, by exercising caution and deploying these few fundamentals, individuals and organizations more broadly can drastically mitigate the chances of falling victim to a phishing attack.