Dan Brody Chief Information and Technology Officer CITO

The Real Threat when they go Phishing

2016-06-07_13-26-44

Dealing with the real threat posed by Spam and Phishing


Phishing attacks, or email-based scams, are one of the most popular ways hackers infiltrate networks. Using phishing attack, a cybercriminal can steal data, hold information, for ransom or conduct corporate espionage.


Gone Phishing

Spam and hacks targeting email have neem around for decades, but they remain surprisingly effective.

  • Business users receive between 12 to 14 spam emails a day on average.
  • Over 100 million phishing attacks occur daily.
  • Around 90% of companies have experienced a phishing attack in the past 12 months.
  • About 28% of spear phishing attacks can circumvent existing cybersecurity defenses.

The True Cost of Phishing

Cybercriminals keep turning to phishing because these attacks can yield major paydays.

  • Spear phishing incidents cost victimized organizations 1.6 million on average.
  • 19% of SMBs were successfully breached through phishing. Small business lost $9,000 per hack, and 60% of SMBs go out of business after a data breach.

How You Can Protect Yourself

Educating employees on phishing, backing up important files and patching software can all help thwart phishing attack, but they're not enough on their own.

  • Prevent threats from entering your network in the first place with a next-generation firewall and a unified threat management solution.
  • Ensure that every single endpoint in the network is adequately protected.

I have had to allot of success with Untangle to prevent Spam and Phishing attacks. I also use the open source version at home to protect my family.

You also need to watch out for Cybersecurity threats and attacks are always evolving. Viruses, worms, trojan horses, spyware, adware and scareware, this includes our for ransomware. Ransomware defined as a type of malware that creates a restriction of some type on the user’s computer.  To remove the restriction; the user must pay a ransom. This form of crimeware is unique in that it tries to coerce the user into directly paying the criminal––effectively turning the malware itself into a way for the attacker to profit. Over the past five years, ransomware has become more and more widespread because of the initial success of cyber criminals in convincing victims to pay to recover their files.

What can you do?

  • Always keep backups
  • Lock down administrative rights
  • Stay up to date
  • Protect at the gateway
  • Keep every endpoint protected
  • If email looks suspicious, it probably is
  • Don't open attachments unless you know who they are from and what they are.

 

 

%d bloggers like this: