Scott Lewis is the president and chief executive officer of Winning Technologies Inc. He has more than 30 years of experience in the technology industry and is a nationally recognized speaker and author of technology subjects. Visit winningtech.com.
In today’s connected world, there is a need for collaborative software and services, but these resources could be exposing you to phishing attacks. Couple the need for collaboration with the need for immediate access to data, then add the human factor, and you have all the dynamics for a robust phishing attack. The following are different types of phishing scenarios and how they each target specific people and processes.
So, how can you start a plan to protect yourself and your business? According to Gillware’s data recovery and digital forensics experts, the following are some primary steps to take.
When you have updated systems, new firewalls, advanced threat detection and antivirus protection in place, but you still become a victim of a phishing scam, you’re left to wonder, “How can this be happening?” According to Protected Trust, cloud security and productivity company, here are some things you can watch for:
All of these steps are important; however, the real weakness is in human conditioning. As such, it is essential to communicate and train employees on the risks of phishing, how it happens and what they can do to be aware of the dangers. Several products allow you to test your employees with fake phishing attempts. These will help you identify who within your employee base is likely to fall prey.