Learn about the techniques to reduce phishing.
- [Instructor] There are many solutions and procedures…we can use to help us defend against phishing attacks.…Most successful phishing attacks…are the result of problems on the end point,…not just people revealing information.…One study notes 62% of people in a phishing test…were using outdated browsers,…and 68% were using an out of date operating system.…Vulnerabilities in the browsers and operating systems…provide a path for hackers to gain access into a network.…
Keep your browsers and operating systems…patched to the latest release.…Many browsers also have an anti phishing capability…that can be enabled,…and will warn you about suspicious websites…and malware, if it is enabled.…Employee training is often the best solution…to defend against phishing,…and we want employees trained on what elements to look for…that identify a message as suspicious.…We need to remember to use our common sense…when responding to email messages.…It is good to remember to use out of band communications…and contact an organization directly…
Phishing is successful when an email message persuades a person to take an action or reveal information which should not be disclosed. Whaling focuses on high-profile targets such as executives, politicians, and celebrities. Learn about the tactics used in phishing and whaling, and view some examples so that you can identify suspicious emails and network intrusions. Then learn how to reduce your risk and put protections in place to help mitigate these threats.
This course was created and produced by Mentor Source, Inc. We are honored to host this training in our library.
- What is phishing?
- Types of phishing, including cat phishing, spear phishing, and vishing
- Phishing examples
- What is whaling?
- How to reduce phishing and whaling with technology and procedures