Éclairer le futur est notre métier

Les Tendances de l'informatique, le séminaire suivi par plus de 30.000 professionnels.

En savoir plus !

Ces technologies numériques qui font rupture, un nouveau séminaire de 2 jours.

En savoir plus !

Taille du texte: +

Feed Import (13 juin 2018)

Hackers love email scams because people—especially in work environments—can be easily fooled by fake requests. Can you prove them wrong?

Say you get an email from the CFO asking to send an immediate wire payment to a vendor for $25,000. She’s never asked you to do this before—but the vendor company is legit, and the amount seems valid. Would you comply without questions? Would you give her a quick call to verify, even if it meant interrupting a meeting?

Or what if, instead of asking to send money, the CFO sends a link and suggests checking out an article she just read? Would you click? Would you even think twice to make sure the email was real?

Face it: We might be shrewd enough to recognize the old Nigerian prince swindle, but when the sender appears to be someone you work for—and the request seems plausible—the lines between ruse and reality can get pretty blurry. On the one hand, if you dare to question what the boss says, you could get in trouble. But, sending thousands of dollars to an unknown bank account, or inadvertently unleashing malware on the entire company network, doesn’t do you any favors, either.

So how can you be better prepared to identify these fraudulent emails? More importantly, can you stop them from hitting your inbox or your clients’ inboxes altogether?

You bet. Try these three tested techniques:

1. Up your email security game. Email is now the No. 1 attack vector for online threats—so, if you don’t have an advanced solution in place, you’re not going to be protected. Period. Look for a multi-layered solution that can detect both known and emerging threats, and that filters out malicious attachments, viruses, phishing scams and other possible risks automatically.

2. Educate users on what’s real—and what’s not. You might not be able to completely outwit would-be attackers, but with the help of awareness training programs, you can provide in-depth guidance on how to identify suspicious emails and common scam tactics. Another educational approach is an internal phishing campaign, where the IT department intentionally tries to dupe users to see where the greatest risk lies and who might need more help in spotting problem emails.

3. Always, always read emails carefully. If something suspicious does make it to the inbox, it’s the job of the user to be a discerning. Any request for an immediate transfer of money should raise a red flag, and any link sent in a message body that lacks real content should also give pause. Hover the mouse over the sender’s name to see if it’s really coming from the expected email address, and look for possible trick spellings in the email domain (where microsoft.com is actually micr0soft.com or microsoftt.com, for example). Ask yourself if the person supposedly sending the email would really write in that style or make that request.

Potential attackers rely on your hesitation and your natural inclination to trust the people with whom you work. Show your team and your clients you’re smarter by taking an aggressive stance to email security. Curious if you have the right defense strategy to protect your business? Click here to learn more.

This guest blog is part of a Channel Futures sponsorship.

Cryptomonnaies : un nouveau comptoir à Marseille
Feed Import (13 juin 2018)
 

Commentaires

Pas encore de commentaire
Already Registered? Login Here
Guest
samedi 18 août 2018

Image Captcha

Copyright © 2018 SLA
167 Chemin des Combes 74110 Essert-Romand - tel : 04.50.83.06.79 - Mobile : 06.75.23.84.11

Mentions légales    -    Politique de confidentialité    -    Plan du site

IMPORTANT

copyright

 Notre blog est un blog de Curation, aussi les articles publiés proviennent-ils de différents flux RSS et nous ne prétendons, en aucune manière, nous en attribuer la paternité. Si vous souhaitez lire l'article original sur le site d'origine, il vous suffit de cliquer sur "Lien d'origine " qu se trouve à la fin de l'article.

Traduire

frendeitptrues

Rechercher

CES 2018

Un CES qui fait whoa !

Regard sur le CES 2018

Témoignages

Ils ont assisté à nos séminaires et ils donnent leurs avis.

Ce que les participants en pensent

Programme 2018

Aller au haut