Tags:
- Attachment: Threats often send attachments that are infected. We need to make end users aware of these attacks, that attackers send emails that build trust with the victim, then fool them into clicking on the attachment. The behavior we need to change is to get people to think before opening attachments. Was the attachment expected? If not sure, contact the sender or forward the email to your security team.
- Links: These attacks work by fooling end users clicking on a link. The link then sends the user to a phishing site, a drive by attacking site, or has them download and open an infected file (such as .pdf ). The behavior we need to change is to get people to think before clicking on links. Was the link expected? If not sure, contact the sender or forward the email to your security team.
- Scams: These attacks fool people out of their information or money by simply asking for it (the classic lottery attack). The behavior we need to change is if something sounds too good to be true, it probably is.
- Spear Phishing: For many high value organizations, they can be targeted or singled out by specific attackers. End users need to understand that attacks can be customized specific to them and their organization.