{"id":2158,"date":"2020-07-01T14:17:27","date_gmt":"2020-07-01T18:17:27","guid":{"rendered":"https:\/\/www.gocomputek.com\/?p=2158"},"modified":"2021-04-09T11:35:24","modified_gmt":"2021-04-09T15:35:24","slug":"phishing-email-attacks-remain-a-real-threat","status":"publish","type":"post","link":"https:\/\/www.gocomputek.com\/phishing-email-attacks-remain-a-real-threat\/","title":{"rendered":"Phishing Email Attacks Remain a Real Threat"},"content":{"rendered":"\t\t
Phishing email attacks<\/a> account for more than 80% of reported security incidents this year alone. A phishing attack is a type of cyber attack that happens via email. The goal of a phishing email is to elicit a response from the user: type in a <\/span>password<\/a>, click on a link, or open an attachment. The end result: to load malware into your computer and hold your data for ransom. Or, in the case of <\/span>spear phishing<\/a>, the aim is to garner a targeted user’s credentials for a later, more specific attack.<\/span><\/p>\n Phishing attacks happen to people all over the world. Businesses, however, are particular targets. Phishing attacks aimed at businesses, or <\/span>Business Email Compromise<\/a> (BEC), has cost businesses 12 billion dollars in the past five years. It\u2019s estimated that <\/span>$17,700 is lost every minute due to phishing attacks.<\/a><\/p>\n Quick tips for spotting a phishing email<\/span><\/p>\n How can you avoid becoming a victim? Knowledge is power. First, you and your employees need to know what phishing emails look like and what to do with them. Bad actors have become incredibly detailed in their scams in the last few years. In the past, phishing emails were often littered with poor spelling and grammatical errors. They were also sent from obviously bogus email addresses. Now, bad actors create whole fake websites that look legitimate. Their emails confuse users and get them to put their credentials into these bogus websites. There are still a few tell-tale signs that an email or a website is not the real thing.<\/span><\/p>\n Malware and Ransomware<\/span><\/p>\n Malicious software, or <\/span>malware<\/a>, can wreak havoc on your systems. In 2019, 94% of malware attacks were delivered via email. One of the most dangerous types of malware is ransomware. Ransomware quietly gets into your computer and\/or your network, encrypts your data and then forces you to pay a ransom to have it decrypted and given back. Estimates suggest that ransomware alone cost businesses 7.5 billion dollars last year. No business, large or small, can afford leaving themselves open to ransomware attacks.<\/span><\/p>\n Solutions to the Problem<\/span><\/p>\n Phishing scams rely on human error. Any business could be one employee click away from a huge payout or data breach. Training your employees is key. Unfortunately, a recent study states that approximately <\/span>60% of users<\/a> receive training less than once a quarter. This means that organizations are not adequately training their employees to spot phishing emails and other attacks.<\/span><\/p>\n Does your organization fall into that 60%? Is your company secure from email phishing, malware and ransomware attacks? Here at <\/span>GoComputek<\/a>, we offer our clients the latest in email filtering software. We also recommend <\/span>Webroot\u2019s Security Awareness Training program<\/a> to any clients looking to train their <\/span>employees<\/a> about email phishing and other types of <\/span>security compliance<\/a> protocols. We can recommend a phishing awareness program that\u2019s right for<\/span> your business<\/a>. If you would like to learn more, please <\/span>contact our office<\/a> today!<\/span><\/p>\n <\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":" Phishing email attacks account for more than 80% of reported security incidents this year alone. A phishing attack is a type of cyber attack that happens via email. The goal of a phishing email is to elicit a response from the user: type in a password, click on a link, or open an attachment. The […]<\/p>\n","protected":false},"author":4,"featured_media":2190,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","footnotes":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"off","ocean_gallery_id":[]},"categories":[206],"tags":[58,237,86,233,235,234,77,236],"yoast_head":"\nTell-Tale Signs<\/h4>\n
\n