Print

Stop Phishing, Social Media, Attacks Event Description

12. 09. 06
posted by: Rick Ewart
Hits: 466

Event Description: Employees are the new front line and need to be educated on how to stop, Phishing, social media, attacks.

It only takes one person or employee to open an attachment to allow an attacker to gain access to corporate information. Once that information is gone it is gone and cannot be recovered from the bad guys. They can now do whatever they want to with your content. They can e-mail your customers as if they were communicating as you. Use your systems to attack others.
Being complacent because of dependency upon technology can leave a business vulnerable to attack.
Because technology has come a long way and is doing a great job of keeping the bad guys out and they now have to find other ways to attack systems
Those other ways are through your employees and they have gotten very good at the game
Its time to teach your employees on what they should be looking for.
This seminar is what Spider uses to educate our customer base and for the first time it is now being offered through the Pembroke Pines chamber
This is a one time offering to the general public
Internal attacks are only going to increase through 2019 as technology improves so do the bad guys
Don’t get caught off guard and educate yourself and those that work within your team on what to look for

  Click here to go to the Pembroke Pines Chamber University: Technology Security site to register

 

Location:

Broward College Weston Center
4205 Bonaventure Boulevard 
Room 220
Weston, FL 33332

Date/Time Information:
Friday, January 25, 2019
9:00AM - 11:00AM

 

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment.

What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It's one of the oldest types of cyber attacks, dating back to the 1990s, and it's still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated.

  1. The human element is incredibly important. Adopting an employee testing program  and do this training on-going basis. The result isn't really employee education or security awareness —it's behavior modification
  2. Think Before You Click! – It’s fine to click on links when you’re on trusted sites. Clicking on links that appear in random emails and instant messages, however, isn’t such a smart move. Hover over links that you are unsure of before clicking on them. Do they lead where they are supposed to lead? A phishing email may claim to be from a legitimate company and when you click the link to the website, it may look exactly like the real website. The email may ask you to fill in the information but the email may not contain your name. Most phishing emails will start with “Dear Customer” so you should be alert when you come across these emails. When in doubt, go directly to the source rather than clicking a potentially dangerous link.
  3. Never Give Out Personal Information – As a general rule, you should never share personal or financially sensitive information over the Internet. This rule spans all the way back to the days of America Online, when users had to be warned constantly due to the success of early phishing scams. When in doubt, go visit the main website of the company in question, get their number and give them a call. Most of the phishing emails will direct you to pages where entries for financial or personal information are required. An Internet user should never make confidential entries through the links provided in the emails. Never send an email with sensitive information to anyone. Make it a habit to check the address of the website. A secure website always starts with “https”.
  4. Use Antivirus Software – There are plenty of reasons to use antivirus software. Special signatures that are included with antivirus software guard against known technology workarounds and loopholes. Just be sure to keep your software up to date. New definitions are added all the time because new scams are also being dreamed up all the time. Anti-spyware and firewall settings should be used to prevent phishing attacks and users should update the programs regularly. Firewall protection prevents access to malicious files by blocking the attacks. Antivirus software scans every file which comes through the Internet to your computer. It helps to prevent damage to your system.

 

Nobody wants to fall prey to a phishing scam. There’s a good reason that such scams will continue, though: They are successful enough for cybercriminals to make massive profits. Phishing scams have been around practically since the inception of the Internet, and they will not go away any time soon