Week 2: Phishing & Social Engineering
VIDEO: Identifying Phishing Emails
Paul Hager, ITP's CEO, reveals how to easily determine if you've received a phishing email AND what to do if you get one. WATCH THE VIDEO >>>
The History of SPAM in 60 Seconds
The first spam email was sent on May 1, 1978, to several hundred people. It was an advertisement for a presentation that was sent by a marketer. The reaction to it was – not surprisingly – almost universally negative. This type of unwanted junk email was named “spam” based on Monty Python’s “Spam, Spam, Spam” sketch. Spam existed mostly to sell adult content and related pharmaceuticals – and to get you to click on links that bring viruses into your network.
In the early 2000s, the IT industry tried techniques like spam filters and cutting off the IP addresses where spam would originate. But these efforts weren’t very effective. IT was constantly playing catchup to spammers.
What actually reduced the amount of spam in the last 10 years was a research endeavor by Microsoft and UC-Berkeley in partnership with Visa. Their research revealed that a small group of organized crime syndicates was actually responsible for the majority of spam emails. Once Visa refused to process payments for products sold via spam, the level of spam went down significantly.
Today, we see the next iteration of spam. As Visa stopped taking transactions from spam, the people behind spam latched onto bitcoin as a form of payment. This has led to the rise of Cryptolocker, botnets, and the Dark Web.
WHITEPAPER: Defending Against Fileless Malware
Fileless malware is coming for you – and anti-virus can’t stop it. It’s one of the most insidious disguises hackers use to slip through the gaps in your network security. It hijacks legitimate, safe-to-use applications built in to every Windows computer. And it’s practically invisible to traditional anti-virus and anti-malware tools.
It’s fileless malware – one of the most effective and rapidly growing cyber threats in the world today. Download our NEW whitepaper “Invisible Attacks: Defending Against Fileless Malware” to:
-Learn what fileless malware is
-Understand how it works and spreads
-Discover strategies for protecting yourself and your company
DOWNLOAD THE WHITEPAPER >>>
VIDEO: The Facts About Phishing Emails
Dale Harkness, senior consulting engineer at ITP, explains the ins and outs of phishing emails - and how you can avoid taking the bait. Watch the Video >>>
INFOGRAPHIC: Tips for Identifying a Phishing Email
Ever get an email that makes you feel uneasy? Maybe a word is spelled wrong, or there is a rogue capitalization in the middle of a sentence … or maybe something about the urgency in the message’s tone throws you off. Get tips for accurately identifying phishing emails in our latest infographic.
DOWNLOAD THE INFOGRAPHIC >>>
INFOGRAPHIC: Social Engineering Tactics
Hacking a human is way easier than hacking a network. Why? Because human emotions, curiosity, and guilt are easily manipulated. The hacker's goal? To obtain some nugget of information that will allow the bad guys into the network - with valid login credentials, through a friendly phone conversation, or even worse by giving them the key to the front door. See why humans are such easy prey for social engineering.
DOWNLOAD THE INFOGRAPHIC >>>
The Breach Report: Hitting Close to Home
Hackers gained access to City of Sun Prairie employee accounts from January-March 2019. The compromised email accounts contained personally identifiable information of Sun Prairie residents, including social security numbers, account login ID and passwords, driver’s license and state identification numbers, bank account numbers, medical information, and payment card information.
City officials don’t know which specific accounts were accessed, so anyone doing business with Sun Prairie should monitor their credit and identity to ensure their personal information is safe.
The lengthy communications delay and uncertainty surrounding the data breach leads to the conclusion the city was unprepared for a cyberattack. The city is now updating its cybersecurity protocols. Read More >>>