Learn about why whaling is sometimes successful.
- [Instructor] Whaling messages are very believable…and convincing, but we can take action…to learn how to spot whaling messages…and prevent their damage in the first place.…Whaling attacks are only effective because of human error.…Whaling messages are targeted to specific individuals.…The messages are designed to trigger a response…if we are not careful.…It is critical people know how to spot whaling messages,…because, ultimately, the damage is caused…when an end user makes a bad choice.…These attacks are continuous…and some of these malicious messages…may pass through our security controls.…
So, a quick review of what to look for should be done.…The first question to ask…is whether the email message received…was expected or is unexpected.…If we were not expecting something,…we should ask questions about it.…Employees need to carefully inspect the address…of email messages they receive,…and see if they know who sent it…if the content is suspicious.…People should check if there are any misspellings…in a message, or if the style of the message is incorrect.…
Phishing is successful when an email message persuades a person to take an action or reveal information which should not be disclosed. Whaling focuses on high-profile targets such as executives, politicians, and celebrities. Learn about the tactics used in phishing and whaling, and view some examples so that you can identify suspicious emails and network intrusions. Then learn how to reduce your risk and put protections in place to help mitigate these threats.
This course was created and produced by Mentor Source, Inc. We are honored to host this training in our library.
- What is phishing?
- Types of phishing, including cat phishing, spear phishing, and vishing
- Phishing examples
- What is whaling?
- How to reduce phishing and whaling with technology and procedures