SHARE
Facebook X Pinterest WhatsApp

5 Ways to Protect Executives from Whaling Attacks

With the daily onslaught of news stories about companies losing millions of dollars to phishing scams, it is incredible to think that email security was practically non-existent as recently as the late 1990s. In fact, Yahoo Mail and Hotmail didn’t roll out anti-spam and antivirus tools to the masses until 1999. (For those of the […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Sep 23, 2016

With the daily onslaught of news stories about companies losing millions of dollars to phishing scams, it is incredible to think that email security was practically non-existent as recently as the late 1990s. In fact, Yahoo Mail and Hotmail didn’t roll out anti-spam and antivirus tools to the masses until 1999. (For those of the Gmail generation, that was back when @yahoo.com and @hotmail.com accounts were the “hip” alternative to mom and dad’s @aol.com accounts.)

Obviously, spam filters and email antivirus scans rapidly became standard among email service providers and they continue to be in use today. Even though they have evolved to react to the latest threats, the problem is that these precursory email security solutions have never been proactive in helping to prevent future threats. The majority of these tools simply compare email contents to signatures of known threats.

One of the future threats that security solutions need to be able to address is whale phishing (“whaling”). Whaling is a type of spearphishing targeting “big fish” in an organization with access to sensitive, highly valuable information. Cybercriminals use this technique to lure senior executives or other key individuals to share valuable information or transfer funds to an account managed by the attacker.

To increase the efficacy of a whale-phishing scheme, cybercriminals will use spymail to gather intelligence on their victim before they move in for the attack. Spymail is an email that contains hidden tracking code that sends information about the recipient back to the sender. The recipient is unaware that such information has been shared with the sender, which allows the attacker to assess who opened the message, where the message was forwarded, the physical location of the user and more without being detected by the victim.

The best way to block spymail and help protect against a future whale-phishing attack is to invest in more advanced technology solutions. These solutions need to be supported with cybersecurity training, policies and procedures, among other precautionary measures.

In this slideshow, Paul Everton, founder of MailControl, has identified the top five ways to prevent a whale-phishing attack in your organization.

5 Steps to Protect Executives from a Whale-Phishing Attack - slide 1

5 Ways to Prevent a Whale-Phishing Attack

Click through for five ways organizations can help protect executives and prevent whale-phishing attacks, as identified by Paul Everton, founder of MailControl.

5 Steps to Protect Executives from a Whale-Phishing Attack - slide 2

Email Security Training

Make email security training mandatory for key individuals.

While training employees at all levels within the organization is essential, senior executives and employees with access to funds and sensitive information require a special training session focused specifically on email security. These employees need to understand how to identify a malicious email, how to verify the sender, and the risks associated with sharing sensitive information or transferring funds based on an email request.

5 Steps to Protect Executives from a Whale-Phishing Attack - slide 3

Implement Multi-Layer Security Systems

The reality is that email security training will never be enough to fully secure an organization. Cybercriminals are too sophisticated in their tactics, with many choosing to target users when they are most vulnerable, whether that be during business travel or after a long day at the office. For this reason, it is important that companies use multiple layers of security solutions that go beyond the basic spam filter and antivirus software to keep company data secure.

5 Steps to Protect Executives from a Whale-Phishing Attack - slide 4

Establish Secure Fund-Transfer Procedures

Considering many whaling attacks attempt to persuade the victim to send company funds to an account controlled by the attacker, establishing clear-cut fund-transfer procedures can help mitigate the risks of unknown users gaining access to company financial information. For instance, companies can require employees to make all fund requests through a secure banking portal with two-factor authentication enabled.

5 Steps to Protect Executives from a Whale-Phishing Attack - slide 5

Incorporate an Anti-Spymail Solution

An anti-spymail solution is an effective way to limit the amount of intelligence hackers can obtain on company leadership and senior executives, as well as all employees within the organization. By limiting an attacker’s ability to know who is communicating with whom and when, anti-spymail solutions make it difficult to craft believable and perfectly timed phishing attempts.

5 Steps to Protect Executives from a Whale-Phishing Attack - slide 6

Exercise Flexibility with Your Cybersecurity Policy

Cybercriminals’ techniques are evolving at an alarming rate, which is why company cybersecurity policies need to be updated constantly to address the latest threats. In addition to updating company security policies, organizations need to incorporate more advanced security solutions as new threats arise.

Recommended for you...

How DeFi is Reshaping the Future of Finance
Kihara Kimachia
Aug 25, 2022
Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.