What is whaling and how to protect your business

  • 📰 IntEngineering
  • ⏱ Reading Time:
  • 37 sec. here
  • 2 min. at publisher
  • 📊 Quality Score:
  • News: 18%
  • Publisher: 63%

Indonesia Berita Berita

Indonesia Berita Terbaru,Indonesia Berita utama

Welcome to the world of whaling, where hackers disguise their contact emails in the name of important C-suite members of your organization.

One fine day, you receive an internal email message from the CFO of a parent company asking you to transfer more than 800,000 euros as part of a ‘strictly confidential acquisition.’ That’s what happened to the CEO and CFO, who ended up transferring the amount, only to find out later it was a fraud.

Whaling emails are very often personalized, including details such as the target’s name, job title, or other relevant information that the criminals have collected from a variety of sources. To ensure your business is protected from Whaling attacks, you must be able to identify what they look like. Here are a few examples.Now, this might appear to be a normal communication cycle because after exchanging emails, you’re talking to a real-world person.

3. Cybercriminals can use birthdays, holidays, job titles, promotions, and relationships to build more sophisticated, undetectable attacks. Hence, be careful about what you are sharing on your company’s social media handles.Are these practices enough?

 

Terima kasih atas komentar Anda. Komentar Anda akan dipublikasikan setelah ditinjau.
Berita ini telah kami rangkum agar Anda dapat membacanya dengan cepat. Jika Anda tertarik dengan beritanya, Anda dapat membaca teks lengkapnya di sini. Baca lebih lajut:

 /  🏆 287. in İD

Indonesia Berita Terbaru, Indonesia Berita utama