Skip to content

Spear Phishing: Your Data at Risk

Spear phishing attacks are especially insidious. An attacker targets an employee in an attempt to trick him into releasing confidential data.

These attackers may use your public directory to identify a likely target and send him an “urgent” request ostensibly from a higher-up. An employee who thinks he’s fulfilling a legitimate request can release confidential data before anyone has a chance to prevent it.

There are several techniques that can help prevent embarrassing, and expensive, data loss.

First, every company should educate their employees so that they understand data security. For example, confidential data should never be sent via email. Users should also be aware that email addresses can easily be faked (called spoofing), so any unusual request for data should be verified in person. Employees are the first line of defense against spear phishing attacks.

However, there is always a chance that an employee will be tricked by one of these attacks, so it’s important that you have other lines of defense in place.

Because spear phishing attacks are usually delivered through email, ensure that your company email provides security measures like encryption, address verification, and two-factor authentication.

Encrypting your data will ensure that unauthorized people can’t access it even if they do manage to acquire a file. All confidential data should be encrypted, and employees should be taught how to use encryption technology.

Email address verification will alert, or prevent delivery, of emails from addresses that differ from what they claim to be. Because spear phishing attacks typically rely on spoofed email addresses, this is a critical step in securing company data.

Finally, two-factor authentication will prevent unauthorized access to company email or resources even when a user’s password has been compromised. Because two-factor authentication requires a second authentication, like a pin that is generated by a separate device or texted to a user’s phone, a hacker will still be unable to access the user’s account.

It’s important to work with a security professional to assess individual company needs and find and fix vulnerabilities. Please contact us to arrange for a consultation.

a person using a laptop computer on a wooden table

Cybersecurity in the Age of Remote Work

https://youtu.be/KV9kgmFj_sM Facing the challenges of remote work requires a proactive approach to cybersecurity measures to ensure the protection of sensitive

Phishing Attack

What to Do After a Phishing Attack

https://www.youtube.com/watch?v=wP42Et2mOGI If you’ve ever wondered what steps to take after falling victim to a phishing attack, rest assured that there

Let's Start a Conversation

Watch the video below and find out why you should fill out this form and start a conversation today.

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.