Learn about the importance of setting a corporate social media policy.
- [Instructor] There are steps that can be taken…to reduce the likelihood of an employee…falling victim to a whaling attack.…It is common to find a company's security team…has mail servers, antivirus software,…intrusion prevention systems,…and firewalls helping to prevent whaling messages…from getting to someone's inbox.…Threat intelligence services are now commonly purchased…that will allow a company to use blacklists…and block unwanted email content from suspicious domains.…Threat intelligence services improve the capabilities…of our hardware and software.…
Email servers use this information…to reject mail from domains considered malicious.…Firewalls use this information to block traffic…from sites noted as malicious.…Intrusion prevention systems will monitor…communications with remote servers,…and can start to block communications…if alerts are triggered.…Mail servers will look for problems…in the content of mail messages…and refuse the message if it is deemed suspicious.…Mail servers can also filter out email containing words…
Phishing is successful when an email message persuades a person to take an action or reveal information which should not be disclosed. Whaling focuses on high-profile targets such as executives, politicians, and celebrities. Learn about the tactics used in phishing and whaling, and view some examples so that you can identify suspicious emails and network intrusions. Then learn how to reduce your risk and put protections in place to help mitigate these threats.
This course was created and produced by Mentor Source, Inc. We are honored to host this training in our library.
- What is phishing?
- Types of phishing, including cat phishing, spear phishing, and vishing
- Phishing examples
- What is whaling?
- How to reduce phishing and whaling with technology and procedures