How to Avoid Targeted "Spear Phishing" Attacks

Cyber Security is a key area of focus for all types of companies as protecting vaulable, sensitive business data makes it's way to the top of most business security priorities. However, it's also important to be aware that many cyber breaches can start with internal weaknesses. Understanding how spear phishing occurs most often will provide you with the knowledge and tools to protect the security of your business data

Here are 4 key ways you can learn how to avoid targeted spear phishing attacks.

1. Be aware that the attacker is going to use your social network connections to get to you.

This is how Google was compromised in the past. Key employees are identified and their friends and connections on Facebook, Linkedin, etc. are targeted. If anyone has hundreds of social links the odds approach 100% that one of them protects their accounts with simple to guess passwords (abc123, 123456, password). Once those accounts are compromised messages are sent to the target from their friend's account making it highly likely that they will see the message, open it, and even click on a provided link.

3. Spear phishing can be very sophisticated.

The malicious URL can be completely unique and the malware used can be new; as it was in the Google attacks. A gateway will not stop it from getting in. Luckily that gateway also provides a second line of defense. Post-infection it will block access to the command and control servers that the infected machine will attempt to connect to. The alerts the UTM generates can help you track down the offending machine/user and get it re-imaged.

4. One of the more recent threats it the targeting of your financial team in an attempt to discover login credentials for your business accounts.

You must find a bank that provides strong authentication to access those accounts, usually in the form of a one time password token. And you must forbid your team from accessing those accounts from outside your network because there are banking Trojans designed to hijack a session and pilfer bank accounts while the authorized user is logged in.

Today's attacks do not stop with technology. Assailants can and will attempt to hire, bribe, or blackmail your people to infiltrate your organization.

Get In Touch

wheelhouse logo
Advertise With Us
info@wheelhouse.com