five best practices for remote workers on phishing emails
200% increase in phishing attacks since #covid-19
verify the sender
One of the top techniques used by hackers is to create an email with a familiar name. Double check to ensure the name is in the same format as past emails and check the "reply to" address. A middle initial being left out or extra space between first and last name are giveaways of a fake email.
verify the domain
Another popular technique will use a familiar name bit fake address or manipulated domain.
inspect grammar, spelling and content
Odd spacings, strange grammar and misspelled words in the body of the email are dead giveaways of a fake email. Additionally urgency or other unusual call to actions require further investigation. A good example is 'review attached document", or "click link to update information"
hover over hyperlinks
Many times a ransomware attack begins because someone clicks on a hyperlink. If you see an interesting link, hover your mouse over it (but don't click it). Look for the underlying URL. If you dont recognise the URL destination, don't click it and notify your security team or your company's leadership.
verify authenticity by calling or texting
Ensure you have 24x7 protection for g-suite and office 365
With work from home, your business is more exposed than ever. Backup alone isn't good enough. Exxa recommends SpinOne by Spin Technology. It uses Artificial Intelligence to monitor your business against threats 24x7. Contact Us to start a free trial.
SpinOne Website: https://spin.ai
Thanks to Spin Technology for this content.