Phishing is a type of social engineering attack mostly used to steal user data. It occurs when an attacker, impersonating a trusted entity, dupes a victim into opening an email, instant message, text message or clicking a link. Motivations for phishing attacks include financial gain, political agenda or even personal revenge. Falling victim to a phishing attack could be entirely detrimental to your company and your personal life.
Phishing emails, text messages or phone calls may look like they’re from a company, colleague, friend or family member you know and trust. They may look like they’re from a bank, a credit card company, a social networking site, an online payment website, an app, or an online store. Phishing emails and text messages often tell a compelling story to trick you into clicking on a link or opening an attachment. It’s easy to fall victim to this kind of attack, which is why it’s vital to be able to recognise one.
Do you want to learn how you can mitigate the risk of a phishing attack? Join us for our phishing and security awareness webinar on the 19th February 2021. The hour-long webinar will focus on understanding the different types of phishing techniques and how these can impact your business, along with actions you can take to mitigate the risk. It is particularly beneficial for security leaders to help them recognise risky and at-risk employees, as well as how to adopt a strong security culture to prevent phishing attacks in their organisation.
With employees likely to remain remote/working from home for the majority of 2021, cyber criminals have adjusted their tactics and techniques to launch fresh waves of sophisticated phishing campaigns designed to steal credentials, compromise company data, and spread malware. Throughout the webinar you will gain a technical perspective on Phishing from our Director of Technology, as well as an insight into how different types of phishing techniques can cause damage, and useful tips on what you can do to prevent this damage. Register your interest using the link below