Question

Write a short "newsletter" article (3 to 5 paragraphs) for the non-technical managers and employees at...

Write a short "newsletter" article (3 to 5 paragraphs) for the non-technical managers and employees at Sifers-Grayson to explain the following:

(a) What is Phishing? (Focus on phishing emails and targeted attacks that include spear phishing and whaling.)

(b) What "bad things" can happen when a successful phishing attack gives outsiders access to company networks and computers?

(c) How can employees avoid "biting" on a "phish?"

(d) How should employees report phishing attacks? Why is immediate reporting critical to stopping the attackers?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

a) Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment.

b)Phishing steals identities and wrecks lives. It affects everyone, from the top manager to lower employees, who have never heard of internet scams. The worst part is that though phishing is now more than a decade old, many people are not familiar with how it works and still fall victim to this scam.Let us look at some of the ways in which successful phishing works.Using data to access a victim’s account and withdrawing money or making an online transaction, e.g. buying a product or service.Using data to open fake bank accounts or credit cards in the name of the victim and usingthem to cash out illegal checks, etc.Using the victim’s computer systems to install viruses and worms and disseminating phishing emails further to their contacts.Using data from some systems to gain access to high value organizational data such as banking information, employee credentials, social security numbers,etc.

c)How do we protect ourselves and our organizations from being another hapless victim? By not biting the bait — identification is the best cure. Here are some pointers to better spot that phishing email:

  • Check the sender's email.
  • Verify the URL.
  • Question the Tone of the Email.

d)You can protect your business from the malicious effects of phishers by, first, training your employees to recognize phishing emails and to dispose of them properly. To do this, each employee should delete any phishing email from their mailbox and from the trash as well. If any employee mistakenly clicks on a link in a phishing email, they should immediately run anti-virus software to get rid of any malware on their system.

Make sure employees feel comfortable reporting the small mistake of clicking on a spam link by establishing a simple protocol for reporting phishing incidents. You don’t want to end up permitting great damage to be done to your proprietary information and your network out of an employee’s fear of getting in trouble.

Add a comment
Know the answer?
Add Answer to:
Write a short "newsletter" article (3 to 5 paragraphs) for the non-technical managers and employees at...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of...

    CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of Personnel Management (OPM) is conducted, may have been extracted. Government offi responsible for recruiting and retaining a world-class cials say that the exposure of security clearance irn workforce to serve the American people and is also mation could pose a problem for years responsible for background investigations on pro- spective employees and security clearances. In June the OPM system, and its records were protected...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT