Category Archives : News

Detecting Phishing Emails

26 Aug, 2016 in

iQSG recently hosted a tremendous training session for IT professionals that desired hands on training with leading SIEM platform, LogRythm. The in depth knowledge transfer left attendees with a deeper understanding of LogRythm as well as SIEM tools and how they are truly an organizations central nervous system.

In today's world, attacks are not about "what if" but "when". A SIEM platform can help alert your organization of threats or suspicious activity but how do you also train employees about common email attacks and phishing scams? 

With mobility in offices - emails are even more quickly assessed and the timespan for considing a response becomes even shorter. Here are 7 important tiggers to watch out for when detecting a phishing email. 

  1. Don't trust that the "from" name is accurate
  2. Don't click just hover
  3. Check for errors
  4. Consider the greeting
  5. What are they asking for?
  6. Is there a time crunch?
  7. Check for a signature

Let's get into more detail...

Don't trust that the "from" name is accurate

The name may appear to be from someone you know and trust but it doesn't mean that it is. Check the actual email address to make sure that the accurate email is there a well.

Don't click just hover

Before clicking on links to check things out, just hover over them to ensure where it looks like you should go is actually where you are going. 

Check for errors

Notice a slip up on grammer or spelling? Attackers are normally less concerned about their vocabulary than a normal, trusted individual. 

Consider the greeting

Is there a generic message in the greeting such as hi, hello, dear so and so? Watch out for these templated items when considering if an item is spam. 

What are they asking for?

Is there a request for personal information? Normally these aren't items that are requested over email so be sure not to comply. Legitimate companies won't ask for important information over email. 

Is there a time crunch?

If there a sense of emergency or time crunch? Attackers will apply false deadlines to put haste into your response getting you to want to act quickly. 

Check for a signature

Company signatures are a mainstay in most organizations. Cloud based signatures allow your team to have signature attachments even from mobile tablets or devices. If you notice an email from a trusted source doesn't have their normal signature, this could be a red flag. 

Although training throughout enterprises has become more mainstream, some entities don't offer formal sessions for alerting their staff of the dangers of an over zelous clicker. The above may sound like obvious items but if staff aren't reminded to keep a watchful eye they may not take a second guess before clicking, downloading or responding. 

Post navigation