{% set baseFontFamily = "Open Sans" %} /* Add the font family you wish to use. You may need to import it above. */

{% set headerFontFamily = "Open Sans" %} /* This affects only headers on the site. Add the font family you wish to use. You may need to import it above. */

{% set textColor = "#565656" %} /* This sets the universal color of dark text on the site */

{% set pageCenter = "1100px" %} /* This sets the width of the website */

{% set headerType = "fixed" %} /* To make this a fixed header, change the value to "fixed" - otherwise, set it to "static" */

{% set lightGreyColor = "#f7f7f7" %} /* This affects all grey background sections */

{% set baseFontWeight = "normal" %} /* More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set headerFontWeight = "normal" %} /* For Headers; More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set buttonRadius = '40px' %} /* "0" for square edges, "10px" for rounded edges, "40px" for pill shape; This will change all buttons */

After you have updated your stylesheet, make sure you turn this module off

Phishing Prevention: How to Identify & Avoid Phishing Scams

by Max Rotter on April 13, 2022

While phishing has been around for a quarter of a century, it remains an effective cyberattack technique primarily because it continues to evolve. As cyber crooks continue to improve and perfect their techniques, your users are more vulnerable to attacks than ever. The best security technology in the world cannot secure your network if employees are opening infected attachments or giving up passwords. Likewise, the cyberwar is too large and complex for an individual to battle without technology in place. 

As you’ll see, it doesn’t matter where your organization is located, or how large or small it is. Phishing attacks affect anyone who uses email and computers. And these attacks are growing in number and sophistication. Typically phishing is done via email or instant messaging, through a fake website that replicates a legitimate one, or through text messages.

For organizations, phishing is often the first step in a complex, multi-stage
attack. Adversaries frequently use phishing to trick users into installing malware or sharing credentials that provide access to their victim’s network.

There are multiple steps a company can take to protect against phishing. They must keep a pulse on the current phishing strategies and confirm their security policies and solutions can eliminate threats as they evolve. It is equally as important to make sure that their employees understand the types of attacks they may face, the risks, and how to address them.

Takeaways from this video include:
  • Why phishing emails are so successful
  • How to identify phishing emails
  • How to prevent phishing attacks before they happen
  • How to take the next steps after an attack
Watch the video now to understand the latest trends and ways to protect your company from phishing attacks.

New call-to-action

Topics: Network Security, Video

Explore Our Full Cisco Line Up
VIEW MORE ABOUT CISCO
cisco devices-2