So, for this final article in the series, we're going to to focus on education. How can you create a workforce that's going to spot phishing attempts and other social engineering scams? Read on for important tips!
Yes, everyone. From the janitor to the CEO, anyone who has access to any sort of information, sensitive locations, or system privileges within a company is a potential target for phishing. Lower-tier targets can be used as springboards to scam higher-tier employees and, of course, gaining access to a C-level exec's passwords is a mother-lode.
Don't let anyone off the hook because they claim they aren't a target, because they are.
There are few genuinely perfect scams in this world, and most phishing attacks will have some big warning signs. Here are some of the most common red flags:
CEO impersonation would be impossible, if everyone in the workforce felt empowered to double-check an iffy message that seems to be from the boss. Employees should NEVER be punished for doing a bit of due diligence to ensure a questionable email is valid, even if their suspicions turn out to be unfounded. The alternative is far worse.
Ideally, your organization should have a clear standardized protocol in place for reporting suspected phishing attempts, and investigating their veracity. This would likely be handled by IT or your security team, just depending on your organizational setup. Sometimes IT can trace such emails back to their source and block them, or potentially even alert law enforcement.
There's simply no better way to know if your staff are properly trained to resist phishing and other social engineering scams, than to have professionals conduct a live simulated attack. So called "white hat hackers" are security experts who make their living testing businesses' security and delivering reports on whether than security could be subverted.
These tests are entirely safe, and no protected data will actually be compromised. The "attackers" will always stop short of doing real harm. They simply show you how harm could be done, by a malicious agent.
Hummingbird Networks can be your partner in creating a highly-effective security setup, from initial deployment to penetration testing. You can read about our services here, then contact us to keep yourself safe from scammers.
Think you're a phishing expert now? See if you can catch all of the phish!