Blog Layout

Phishing Attacks and How It Affects Your Organization

Akins IT • Feb 03, 2020

WHAT IS PHISHING? 


Phishing is an attack on individuals in an attempt to steal sensitive information through emails, websites, text messages or other forms of electronic communication that often look to be official communication from a legitimate company or individual. ​The information these cybercriminals attempt to steal can be user names, passwords, credit card details, bank account information or other credentials.​ Attackers can then use stolen information for malicious purposes, such as hacking, identity theft, or stealing money directly from bank accounts and credit cards. In some cases, they even sell this stolen information in cybercriminal underground marketplaces​.


HOW DOES IT WORK?


Phishing attacks often use social engineering bait or lure content. ​For an organization, a successful phishing attack typically entails discovery and planning by collecting what information is available publicly on the company website, social media, or even domain records such as SPF and MX records.​ This may allow a cybercriminal to articulate the following:


  • the naming scheme in an organization for users accounts
  • high ranking officials
  • what email security solution is being utilized
  • what vendors are being used internally. ​


A cybercriminal will then move to trial and error, where they begin to determine what users may expect on a day to day basis and monitor the results of their fraudulent emails. ​Most commonly, its legitimate-looking communication (usually email) that links to a phishing site mimicking sign-in pages that require users to input login credentials and/or account information. The phishing site then captures the sensitive information as soon as the user provides it, giving attackers access to the information. ​Once they have garnered any level of access they will use this to either initiate an attack or gather additional information to create a even more devised attack. ​


WHAT ARE SOME COMMON TYPES OF PHISHING TECHNIQUES USED AGAINST ORGANIZATIONS?​


  • Whaling – A form of phishing in which the attack is directed at high-level or senior executives within organizations. The content could be written as legal subpoena, customer complaints, or other executive issues​.
  • Impersonation – Where a cybercriminal may attempt to create an email that looks like it is being sent from the CEO, CFO, or other important employees in the organization. Usually the email will request for a specific task to be preformed or access to a specific document.
  • Spear Phishing – A targeted phishing attack involving highly customized lure content towards a specific organization. This socially engineered email would be designed to lure you into opening documents or clicking links that automatically install malware. ​
  • Phishing – A board, automated attack that is less sophisticated or targeted. Its intentions are to send out as many emails, to as many domains as possible and monitor for any results.​


VERIZON'S 2019 DATA BREACH INVESTIGATIONS REPORT


This is the annual analysis of security events impacting organizations around the globe. This is the 12th edition of this report which contains comprehensive summary of data breaches that were reported by public and private entities around the globe. 

Report highlights:​


  • 43% of cyberattacks were on small businesses​
  • C-Suite executives are 12 times more likely to be targeted in social engineering attacks than other employees​
  • Phishing is involved in 32% of breaches and 78% of cyber-espionage incidents​
  • 90% of malware arrives via email​
  • Ransomware is the second biggest malware threat and accounted for 24% of malware-related breaches​


These highlights are important because it shows the vulnerability for cybercriminals to target organizations who don’t have an appropriate solution in place. The solutions that we are discussing in future blogs and webinar videos provide protection against data breaches and phishing overall. 

CONTACT US TO LEARN MORE ABOUT THIS TOPIC OR TO SCHEDULE A CALL
By Shawn Akins 15 Apr, 2024
In the ever-evolving landscape of the digital workplace, Microsoft 365 Copilot stands as a beacon of innovation, guiding users through the complexities of their daily tasks with ease and efficiency. As we embrace this new era of work, understanding the capabilities and utilization of Copilot prompts becomes essential. What are Copilot Prompts? Copilot prompts are intelligent cues that empower users to harness the full potential of Microsoft 365. They are designed to understand the context of your work and provide suggestions that are not only relevant but also tailored to enhance productivity.  The Power of Contextual Understanding At the heart of Copilot prompts is the advanced AI that meticulously analyzes the content you're working on. Whether it's an email, a document, or a spreadsheet, Copilot grasps the essence of your task and offers prompts that propel you forward. Streamlining Collaboration Collaboration is the cornerstone of modern work, and Copilot prompts are the perfect ally. They facilitate seamless communication by suggesting replies in emails, aiding in the co-authoring of documents, and ensuring that your team stays on the same page. Enhancing Creativity Beyond the realms of productivity, Copilot prompts also serve as a muse for your creativity. They can assist in drafting compelling narratives, generating ideas, or even crafting personalized messages that resonate with your audience. Learning and Growing with Copilot As you interact with Copilot prompts, they learn and adapt to your unique style and preferences. This continuous learning process ensures that the assistance you receive is always improving, making your experience with Microsoft 365 increasingly intuitive. Conclusion Microsoft 365 Copilot prompts are more than just a feature; they are your partner in navigating the future of work. By understanding their functionality and integrating them into your workflow, you can unlock new levels of efficiency, collaboration, and creativity.
By Shawn Akins 15 Apr, 2024
Sky at Chandler Airpark
By Leislee Mamba 18 Jan, 2024
Akins IT assists Management Support in migrating their physical server infrastructure to new hardware and enhancing their backup process for improved disaster recovery.
More Posts
Share by: