Learn about how to defend against phishing attacks.
- [Instructor] There are many technological solutions…that we often find in place to help protect us…from phishing attacks which we will now look at.…We can choose to purchase Threat Intelligence services…from external companies to help us combat phishing.…These services use their expert knowledge to inform…and warn us about malicious content we might receive…and block our access to sites identified as being malicious.…These Threat Intelligence organizations are experts…and monitor and track malicious entities participating…on the internet.…
We can also use Threat Intelligence services to integrate…with our existing security hardware like firewalls…and mail servers.…Many next-generation firewalls include anti-virus,…anti-phishing, and anti-malware capabilities…that can help block phishing attacks.…Most current mail servers can add capabilities…to filter and block spam and phishing messages…by looking for patterns in the messages received.…As we saw earlier, we can reduce the impact of phishing…by examining the messages we do receive.…
Phishing is successful when an email message persuades a person to take an action or reveal information which should not be disclosed. Whaling focuses on high-profile targets such as executives, politicians, and celebrities. Learn about the tactics used in phishing and whaling, and view some examples so that you can identify suspicious emails and network intrusions. Then learn how to reduce your risk and put protections in place to help mitigate these threats.
This course was created and produced by Mentor Source, Inc. We are honored to host this training in our library.
- What is phishing?
- Types of phishing, including cat phishing, spear phishing, and vishing
- Phishing examples
- What is whaling?
- How to reduce phishing and whaling with technology and procedures