Identify a Phishing Message in Five Steps

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7
Previous Next

Click through for a five-step checklist to help identified phishing emails, as identified by Paul Mah.

Topics : Box.net, IT Management Automation, SharePoint, Facebook, T-Mobile

From the network breach at RSA to theft of intellectual property in Operation Aurora, it is no secret that some of the most visible hacking involves the use of spear phishing. A targeted form of phishing that is custom-made for a specific organization, a spear phishing email message seeks to elicit a desired action that could result in a Trojan being loaded, or the unintended leaking of confidential or privileged data.

As Paul Mah has written in the past, defending against spear phishing is a challenging task that mandates some amount of user training. To assist organizations on this front, Paul has come up with a simple checklist to help identify a potential phishing message.

 

More Slideshows

ConvergedTechUC0x Eight Steps to Reach New Heights with Unified Communications

An eight-step plan for CIOs and IT professionals who want a truly scalable, secure, and converged unified communications solution that can deliver business-critical services. ...  More >>

IT_Man11-190x128 Best Practices for Enhancing SharePoint Adoption

Businesses implementing SharePoint without a strategy to increase adoption are wasting time, money and the opportunity for their employees to embrace Microsoft's powerful collaboration system. ...  More >>

IT_Man8-290x195 Top 10 IT Performance Management Predictions for 2014

In 2014, as organizations look to do more with less, IT performance management will be measured by business value. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.