Rhyme Technology Blog

July 31, 2017 @ 12:00am

PhishingWhether or not you think you’re in danger of a cyber attack, the truth is anyone online can be a target for hackers and cybercriminals. You might not think you're that interesting or have valuable data to give, but hackers can still profit from your misfortune, and use you as stepping stone to get at someone else. Today, phishers, on average, launch a new attack every 30 seconds and phishing schemes are growing increasingly sophisticated as cyber attackers use new tools and tactics to create authentic-looking emails.


Given its cheap cost and high success rate, phishing has become one of the most common scams across organizations today. The most common type of phishing attack involves a criminal posing as a high-level executive who will then send an email message to an employee with access to a desired system or information. According to PhishMe, phishing emails pretending to be regular office communications are the most effective, with an average click-through rate of 22 percent.

Source: KnowBe4So, why does phishing keep happening? It’s because people continue to fall for it! Organizations should begin to prioritize security training and education to prevent their employees from being such easy targets. It is imperative that all employees in an organization understand what a phishing email looks like and how to avoid becoming a victim. There are a number of free online phishing tests available to you and your employees, Rhyme can also help develop a test to help educate your people.

The following are some additional tips to avoid phishing scams:

  1. Educate all employees about phishing in general and spear phishing in particular.
  2. Use strong, unique passwords. Better yet, use a phrase instead of a word. Use different passwords for each account. Use a mix of letters, numbers and special characters.
  3. Never take an email from a familiar source at face value. If it asks you to open a link or attachment, or includes a threat to close your account, think twice.
  4. If an email contains a link, hover your cursor over the link to see the web address (URL) destination. If it’s not a URL you recognize or if it’s an abbreviated URL, don’t open it.
  5. Consider a verbal confirmation by phone if you receive an email from a client or coworker requesting sensitive information or other requests that seem odd to you.
  6. Use security software to help defend against malware, viruses and known phishing sites and update the software automatically.

The reality is, companies are simply not doing enough to reduce the risks associated with phishing and malicious software. If your company is looking to take it a step further Rhyme can help you with remote monitoring and management of your network to be more proactive in preventing phishing and similar attacks. Should you fall victim to a phishing attack, Rhyme would have a reliable backup and disaster recovery (BDR) solution in place to ensure your essential data can be restored with as little downtime as possible. Contact us today for more information.

About the author:

comments powered by Disqus

Recent Blog Posts

Why You Should Multifunctional-ize

Many businesses are unaware of just how many standalone printers they have. Making matters worse, many decision makers don’t know that these devices can be expensive to both operate and maintain. Learn More>>

10 Benefits of In-House Production Print

Having a light production device in-house allows you to print when you want at a fixed cost. Outsourcing this type of job, on the other hand, may introduce challenges around turnaround time and pricing—particularly when a job is needed quickly. Learn More>>

How To Prevent Data Loss

Not really sure what a backup is? Don’t worry you’re not alone, over 30% of people never backup their files. A backup is a second copy of all your important files. Instead of storing it only on your computer, you keep another copy of everything somewhere safe, at an off-site location. Learn More>>

3 Tips For Better Laptop Security

It can happen to the best of us—your shiny new phone, tablet or laptop, left in an airplane seat pocket or stolen at the local coffee shop when you got up for a refill. Imagine losing the device that connects you to the outside world, and most importantly, your work. Read More>>

 

Sign up for our eNewsletters

 

Sign me up!