How to Avoid Targeted "Spear Phishing" Attacks
Cyber Security is a key area of focus for all types of companies as protecting vaulable, sensitive business data makes it's way to the top of most business security priorities. However, it's also important to be aware that many cyber breaches can start with internal weaknesses. Understanding how spear phishing occurs most often will provide you with the knowledge and tools to protect the security of your business data.
Here are 4 key ways you can learn how to avoid targeted spear phishing attacks.
3. Spear phishing can be very sophisticated.
The malicious URL can be completely unique and the malware used can be new; as it was in the Google attacks. A gateway will not stop it from getting in. Luckily that gateway also provides a second line of defense. Post-infection it will block access to the command and control servers that the infected machine will attempt to connect to. The alerts the UTM generates can help you track down the offending machine/user and get it re-imaged.
4. One of the more recent threats it the targeting of your financial team in an attempt to discover login credentials for your business accounts.
You must find a bank that provides strong authentication to access those accounts, usually in the form of a one time password token. And you must forbid your team from accessing those accounts from outside your network because there are banking Trojans designed to hijack a session and pilfer bank accounts while the authorized user is logged in.
Today's attacks do not stop with technology. Assailants can and will attempt to hire, bribe, or blackmail your people to infiltrate your organization.