What is whaling and how to protect your business

  • 📰 IntEngineering
  • ⏱ Reading Time:
  • 37 sec. here
  • 2 min. at publisher
  • 📊 Quality Score:
  • News: 18%
  • Publisher: 63%

المملكة العربية السعودية أخبار أخبار

المملكة العربية السعودية أحدث الأخبار,المملكة العربية السعودية عناوين

Welcome to the world of whaling, where hackers disguise their contact emails in the name of important C-suite members of your organization.

One fine day, you receive an internal email message from the CFO of a parent company asking you to transfer more than 800,000 euros as part of a ‘strictly confidential acquisition.’ That’s what happened to the CEO and CFO, who ended up transferring the amount, only to find out later it was a fraud.

Whaling emails are very often personalized, including details such as the target’s name, job title, or other relevant information that the criminals have collected from a variety of sources. To ensure your business is protected from Whaling attacks, you must be able to identify what they look like. Here are a few examples.Now, this might appear to be a normal communication cycle because after exchanging emails, you’re talking to a real-world person.

3. Cybercriminals can use birthdays, holidays, job titles, promotions, and relationships to build more sophisticated, undetectable attacks. Hence, be careful about what you are sharing on your company’s social media handles.Are these practices enough?

 

شكرًا لك على تعليقك. سيتم نشر تعليقك بعد مراجعته.
لقد قمنا بتلخيص هذا الخبر حتى تتمكن من قراءته بسرعة. إذا كنت مهتمًا بالأخبار، يمكنك قراءة النص الكامل هنا. اقرأ أكثر:

 /  🏆 287. in SA

المملكة العربية السعودية أحدث الأخبار, المملكة العربية السعودية عناوين