Skip to main content

To Phish or To Be Phished

What is Phishing?

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication. Typically carried out by email spoofing or instant messaging, it often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site.

What is Spear Phishing?

Spear-phishing is a targeted attempt to steal sensitive information such as account credentials or financial information from a specific victim, often for malicious reasons. This is achieved by acquiring personal details on the victim such as their friends, hometown, employer, locations they frequent, and what they have recently bought online. The attackers then disguise themselves as a trustworthy friend or entity to acquire sensitive information, typically through email or other online messaging. The main difference betwen Phishing and Spear Phishing, is Spear Phishing is very precise and very targeted in nature. 


How can you prevent any potential damage of phishing to your brand? 

  1. Develop and run in-house internal user awareness program to computer security regularly
  2. Over communicate the risks and dangers of phishing to your external customers and suppliers
  3. Buy all possible spoofable domain names to protect themselves and their suppliers and customers. To make things worse, all web url and email are underlined
    • user@woman.com become user@vvoman.com  (w is replaced by double v)
    • www.woman.com become www.wornan.com (m is replaced by r & n)
    • www.catgirl.com become www.catqirl.com (g is replaced by q)
    • www.google.com become www.qooqle.com (g is replaced by q) 
    • It is expensive exercise to do. There are endless combination of these domain.

How can you do to migitate the risks of the impact of phishing?

  1. Change password at least once a year
  2. Enable 2FA/MFA for your email accounts (via sms or mobile apps authenticator)
  3. Enable Windows Defender Browser Protection for Google Chrome Browser
  4. Enable mail identity protection on your mail server
  5. Install a reliable and effective endpoint security software for your PC or Notebook. We recommend that you can try Kaspersky Endpoint Security Cloud Plus. It has Mobile Security and Security for Microsoft Office 365
  6. If you are using Office 365 (O365) or Microsoft 365 (M365) then you should enable Office 365 Advanced Threat Protection. It has Safe Links, Safe Attachments and ATP anti-phishing protection
  7. Put in internal control checks to manage any external request to change bank account number
    • Check Domain with Domain Dossier https://centralops.net/co/DomainDossier.aspx 
    • Insist on Offical Signed and Stamped Document   
    • Land Phone Verification 
      • Use a verified telephone number taken from namecard
      • Do not use the telephone number taken from the email

Comments

Post a Comment

Popular posts from this blog

Mail Flow Topology

It is important to understand the entire mail flow from sender to receiver. It helps to understand the entire mechanics and workings of all the several components that exists in the mail flow topology. The understanding of this will help you to troubleshoot why some email cannot be send or why you cannot receive certain emails. A - User compose a  email using Mail Client. The email is sent from mail client to mail server via SMTP, MAPI or ActiveSync. The Mailbox maintain constant connectivity B - Mail Server check for outgoing mail security rules/policies C - If YES, then check for Internal Mailbox D - Deliver to Mailboxes E - If uncached or new MX Domain record, then query MX from DNS Server F - Sender Mail to Receiver Mail Server via SMTP (25, 2525) or SMTPS (465) or SMTP/TLS (587) G - Received Mail Server check SPF records H - Mail Server check for incoming mail security rules/policies I - Mail Server check for valid user mailbox J - Mail Server deliver to User mailbox

How to have the Best Video Conference Meeting Experience?

Better Video/Audio  Good WebCam -  Logitech FHD WebCam , Microsoft LifeCam, Razer Kiyo Good Microphone - Blue Yeti, Samson Go, Razer   Good Headset -  Logitech ,  Plantronics ,  Jabra Good Speakerphone - Jabra , Logitech , Poly (Plantronics) , Yealink Better Position Realign eye level to webcam Better Lighting  Avoid any light source like windows or lamp behind you Observe 3 point Lighting Enable FHD  In Zoom https://support.zoom.us/hc/en-us/articles/207347086-Group-HD Need Business, Enterprise and Education (Pro version can support HD 720p only) Run on i7 processor notebook Enable Group HD Select Full HD (1080P) Need at least  Receiving (Download) 2.5 Mbps   Sending (Upload) 3Mbps  Check here https://www.speedtest.sg In Microsoft Teams Default is FHD 1080p IT Support, IT Company, IT Services Win-Pro Singapore IT Support, IT Company, IT Services Win-Pro Malaysia

The Value Of IT Support Service In Running A Successful Business

Managing an IT department in Singapore is just one of one of the most challenging aspects of running an organization. It can be costly and time-consuming especially for small as well as medium-sized enterprises. This is why more and more organizations are selecting to outsource their IT requires to 3rd parties. It’s a choice that is not only less expensive yet additionally enables ventures to focus all their efforts on their core operations. The surge of IT support business is a testimony to their dependability as well as the obvious count on that service put on them   IT Support Singapore . Is IT Support Really Necessary? In today’s technology-driven setting, it’s really crucial for businesses to make certain that their IT needs are fulfilled not just for the business but also for the purpose of their consumers as well. This is specifically true for a very urbanized nation with a tech-savvy population like Singapore. For this reason alone, IT sustain upkeep in Singapore is definitely