Phishing and whaling defraud millions of companies every year. Find out how to identify these attacks, and reduce your risk.
- [Instructor] My name is Todd Edmands and this is part of our Cyber Security Awareness series. I'm a computer security expert who has worked in the information technology business sector for more than 20 years. I have a master's degree in systems engineering and information assurance from Regis University, and I am an affiliate faculty member of this institution. To best understand the topic of phishing, it is assumed students are familiar with the use of email for business communications. Today, we will be exploring how hackers use phishing attacks for fun and profit. It is common for companies to spend millions of dollars per year to prevent and mitigate the damaged caused by phishing attacks.
We will investigate what a phishing attack is, along with the motives of the attackers. There are a variety of categories phishing attacks fall into that we will investigate. Next, we will review examples of what these types of phishing messages will look like and how we might identify the messages as a phishing attempt. Once we understand these attacks, we will review technologies and procedures that are used to reduce and stop these attacks. Now, let's get started.
Phishing is successful when an email message persuades a person to take an action or reveal information which should not be disclosed. Whaling focuses on high-profile targets such as executives, politicians, and celebrities. Learn about the tactics used in phishing and whaling, and view some examples so that you can identify suspicious emails and network intrusions. Then learn how to reduce your risk and put protections in place to help mitigate these threats.
This course was created and produced by Mentor Source, Inc. We are honored to host this training in our library.
- What is phishing?
- Types of phishing, including cat phishing, spear phishing, and vishing
- Phishing examples
- What is whaling?
- How to reduce phishing and whaling with technology and procedures