Identify a Phishing Message in Five Steps

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7
Previous Next

Click through for a five-step checklist to help identified phishing emails, as identified by Paul Mah.

From the network breach at RSA to theft of intellectual property in Operation Aurora, it is no secret that some of the most visible hacking involves the use of spear phishing. A targeted form of phishing that is custom-made for a specific organization, a spear phishing email message seeks to elicit a desired action that could result in a Trojan being loaded, or the unintended leaking of confidential or privileged data.

As Paul Mah has written in the past, defending against spear phishing is a challenging task that mandates some amount of user training. To assist organizations on this front, Paul has come up with a simple checklist to help identify a potential phishing message.

More Slideshows:


Five Reasons Project Portfolio Management Will Matter to CIOs in 2012 PPM is moving beyond business projects to managing value and change, as well.

Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012 Businesses need to increase their focus on identity and privacy projects that can deliver real value not just to IT, but also to the business.

Spam and Phishing Report: Scammers Taking Advantage of Major EventsSpammers are using major events and holidays to make their mail more appealing.

 

Related Topics : Box.net, IT Management Automation, SharePoint, Facebook, T-Mobile

 
More Slideshows

email6-190x128 Six Tools to Help You Gain Control of Your Inbox

We spend hours every day sorting through incoming messages in an attempt to keep on top of projects, but have to deal with tons of spam, scams and less than productive trash. ...  More >>

mobile54-190x128 Five Ways to Stay Productive While Working Remotely

There's no magic bullet, but the essentials are to make sure to have the right tools at your disposal while on the move to communicate with your teams in ways that fit your needs, as well as being flexible, clear and direct in your communication. ...  More >>

DataM28-190x128 Five Enterprise File and Storage Predictions for 2015

Companies need to define strategies around enterprise file synch and share (EFSS) and evaluate which solutions will make employees most productive while keeping vital information secure. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date