Jump to content
Sign in to follow this  
KyleH

Information Security Awareness and how to be Safe

Recommended Posts

Some experts such as Gartner Research, Verizon, and other leading firms have pointed out that many of the worst breaches – from Target, to New York Times, to Anthem, all sprang from a decades-old technology: email. Clearly cybercriminals will continue to use email as a primary vector to breach into organizations and compromise system and sensitive data.

 

Security with emails and other types of social engineering is all about knowing who and what to trust.  Knowing when, and when not to, take a person at their word; when to trust that the person you are communicating with is indeed the person you think you are communicating with; when to trust that a website is or isn’t legitimate; when to trust that the person on the phone is or isn’t legitimate; when providing your information is or isn’t a good idea.  

 

How to avoid falling victim to a malicious adversary:

  • Don't open attachments from unknown sources or from emails that appear to be from a legitimate source but are suspicious
  • Only click links in email you know for certain are legitimate
  • Do not open or interact with emails from businesses unless you were expecting them. Ignore any links and go directly to the website by typing in the url if worried about the contents
  • Never, EVER, enter your credentials or credit card information on an email or via a link provided within an email.
  • What’s more:
    • Do not attempt to download or install files from the Internet without prior knowledge of the application and reputation.
    • Regularly back up important local data and keep it on network drives or USB drives.
    • Do not store sensitive data files on mobile devices.
      • Ensure you are educated in good computing practices and how to spot threats.

 

 

What are your thoughts on this being the oldest but also one of the deadliest ways to infiltrate a company?

Do you follow the same examples we provide to stop malicious damage?

 

 

Let us know what you think!

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  

×