Have a Question?
-
General Security FAQs
- How do I stop phone scams?
- What does cyber security training involve?
- Why do businesses need cyber security training?
- Do I need antivirus on my mobile phone?
- Where Can I Get Free Cyber Security Advice?
- Are security assessments needed within education settings?
- Do I need to worry about security of cloud-based systems we use?
- We’re a small company do we need to worry about cyber security?
- I have anti-virus software do I need more than this?
-
Our Services
-
Securing your business
- What does cyber security training involve?
- Why do businesses need cyber security training?
- How do I secure Amazon Web Services?
- How can we secure Google Workspace (G-Suite)?
- What is the Best Antivirus Software?
- Who Should Be Responsible for Security in a Business?
- What is Microsoft SecureScore?
- What Does a Virtual CISO Do?
- How Secure Are Chromebooks?
- Can I Use the Same Password Everywhere?
- What is a Vulnerability Assessment?
- What is Disaster Recovery?
- How Long Should My Password Be?
- What is a Password Manager?
- How Often Should I Change My Password?
- What is a Business Continuity Plan?
- Show all articles ( 1 ) Collapse Articles
-
Standards & Frameworks
- Does ISO 27001 Cover GDPR?
- What is HIPAA?
- What is PCI DSS?
- How is Cyber Essentials Assessed?
- What are the ISO 27001 Controls?
- How Long Are Cyber Essentials Certificates Valid For?
- Does Cyber Essentials Cover GDPR?
- What is Cyber Essentials?
- What is the Difference Between Cyber Essentials and Cyber Essentials PLUS?
- What are the benefits of ISO 27001?
- What is ISO 27001?
-
Laws & Regulations
-
Cyber Security Glossary
- What is Tailgaiting?
- What is PreTexting?
- What is Scareware?
- What is Baiting?
- What is Penetration Testing?
- What is Ethical Hacking?
- What is XSS?
- What is WAF?
- What is VPN?
- What is TVM?
- What is SSO?
- What is SQLI?
- What is SOAR?
- What is SIEM?
- What is RBAC?
- What is RAT?
- What is PCI-DSS?
- What is OSINT?
- What is NIST?
- What is NCSC?
- What is MFA?
- What is MAC?
- What is ISO?
- What is IPS?
- What is IOT?
- What is IOC?
- What is IDS?
- What is HTTPS?
- What is HIPAA?
- What is GDPR?
- What is EDR?
- What is DLP?
- What is DDoS?
- What is DOS?
- What is DAC?
- What is CVSS?
- What is CND?
- What is CISSP?
- What is CISO?
- What is the CIA Triad?
- What is AV?
- What is AC?
- What is APT?
- What is 2FA?
- What is a Virtual CISO or vCISO?
- What is Blue Teaming?
- What is Purple Teaming?
- What is a Zero-Day Vulnerability?
- What is a Zero-Day Attack?
- What is XSS (Cross-Site Scripting)?
- What is a Worm?
- What is White Teaming?
- What is Whaling?
- What is a Watering Hole Attack?
- What is Vulnerability?
- What is a VPN (Virtual Private Network)?
- What is a Virus?
- What is URL Injection?
- What is a Trojan?
- What is a Threat Actor?
- What is Steganography?
- What is SQL Injection?
- What is Spyware?
- What is Website Spoofing?
- What is Spear-Phishing?
- What is Spam?
- What is Social Engineering?
- What is Smishing?
- What is Single Sign-On (SSO)?
- What is Sextortion?
- What is a Sandbox?
- What is Salting?
- What is an RPO (Recovery Point Objective)?
- What is a Rootkit?
- What is a Remote Access Trojan (RAT)?
- What is Red Teaming?
- What is Ransomware?
- What is PII (Personally Identifiable Information)?
- What is a firewall?
- What is "cyber security"?
- Show all articles ( 65 ) Collapse Articles
-
Cyber Threats
Why is Phishing so Hard to Stop?
4.5 out of 5 stars
1 rating
| 5 Stars | 0% | |
| 4 Stars | 100% | |
| 3 Stars | 0% | |
| 2 Stars | 0% | |
| 1 Stars | 0% |
Phishing attacks are becoming more and more sophisticated and essentially rely on the unsuspecting recipient clicking a link in the email or downloading an attachment. Although email clients have various safeguards built in, phishing emails will still often get through to victims’ inboxes. In essence not all phishing emails can be stopped, but the potential effects can be controlled through staff awareness and training.
By nature, people are generally trusting and can be easily misled into clicking on what looks like an email from a legitimate source, especially if they are busy, distracted or expecting a similar email to arrive. Attackers take advantage of this and target victims with content and at times they are less likely to be on their guard. For example, late on a Friday afternoon, an employee might be more relaxed, busy finishing off the weeks work in anticipation of leaving the office for the weekend, keen to get home. They are less likely to be vigilant at this time than say on a Tuesday morning.
Staff awareness and training is therefore THE most important factor in surviving a phishing attack.
If you need support in protecting your staff and organisation from phishing attacks get in touch with us today.
4.5 out of 5 stars
1 rating
| 5 Stars | 0% | |
| 4 Stars | 100% | |
| 3 Stars | 0% | |
| 2 Stars | 0% | |
| 1 Stars | 0% |