
E-mail Security: Recognizing a Cyber Attack
Course Description:
E-mail is all but required for normal business operations, and it’s easy for cyber criminals to use as a vector of attack. But what does an e-mail attack look like, and how do you avoid it? This module is an introductory overview of cyber security best practices relating to e-mail security for new employees during onboarding or as a refresher course for those without a cyber security background. You will learn how to recognize an e-mail-based phishing attempt and learn some of the tactics cyber criminals use to get a victim’s personal information. It then presents some e-mail best practices.
Why “E-mail Security: Recognizing a Cyber Attack” Matters:
The more that technology in the workplace is implemented to meet business needs, the greater the organization’s exposure to cyber threats. There are known and specific threats to information technology infrastructure, including computers, networks, and Internet-connected devices. There are basic measures employees can take to protect data and hardware.
Key Points:
- Phishing, via e-mail, or smishing, via SMS or MMS messaging on a smartphone are attacks that attempt to trick a victim into providing personal information.
- Phishing tactics include techniques such as pretexting and baiting.
- Do not click links or open files in suspicious e-mails.
- Closely examine an e-mail’s header, body, and signature for clues of a phishing attempt.