Deception of employees with mail scams returns: what companies do to avoid it

Deception of employees with mail scams returns: what companies do to avoid it
Deception of employees with mail scams returns: what companies do to avoid it

Phishing attacks seek to trick victims with messages that motivate immediate action. (Illustrative image Infobae)

Email attacks are one of the methods most used by cybercriminals to reach a company. Phishing, as this type of threat is known, is an ongoing problem that companies must take into account, knowing that there is a high percentage of workers who can download or enter a link and give access to attackers.

According to data from the Cybersecurity and Infrastructure Security Agency (CISA, for its acronym in English)84% of employees are easy prey for email frauds. This alarming figure reveals a worrying vulnerability within organizations: the lack of cybersecurity awareness and training among staff.

Email has become the primary attack vector for phishing, malware, and scam campaigns. Cybercriminals, backed by artificial intelligence, have perfected their tactics to trick users into gaining access to sensitive information or compromising corporate systems.

Employees often don’t know how to respond to email attacks, and teams aren’t ready either. (Illustrative Image Infobae)

CISA’s assessment reveals that 84% of employees fall for it within the first 10 minutes of receiving a phishing email. Whether by responding with sensitive information, clicking on malicious links, or downloading spoofed attachments, employees unwittingly become complicit in cyberattacks against their own companies.

This panorama has led companies to rethink their approach to cybersecurity. Gil Friedrich, vice president of email security at Check Point Software, points out the importance of comprehensive and proactive protection against sophisticated phishing tactics, as “Cybercriminals are finding new ways to deliver these emails and it is necessary to have a 360 security solution that proactively counters sophisticated phishing tactics.”

An example of this type of software is the one developed by the cybersecurity company itself called Harmony Email & Collaboration, which includes a patented quarantine system, DMARC monitoring, storage and Smart Banners.

Companies must educate their workers so they know how to stop phishing attacks. (Illustrative Image Infobae)

The unified quarantine system streamlines email management and allows administrators and end users to view and restore emails in an integrated console, simplifying the threat detection and response process.

On the other hand, DMARC monitoring helps protect companies’ brand reputation and prevent phishing attacks, while the storage functionality allows emails to be safeguarded for many years, facilitating recovery in case of data loss. or legal needs.

Additionally, Smart Banners educate users about cybersecurity, They promote policy compliance and alert you to suspicious emails in a subtle but effective way.

However, the responsibility does not fall solely on technological solutions. It is essential that companies invest in cybersecurity awareness and training programs for their employees. Education and continuous training are key to strengthening the human factor in the defense chain against phishing and other cyber attacks.

Companies must educate their workers so they know how to stop phishing attacks. (Illustrative Image Infobae)

Thanks to artificial intelligence it is possible to create very well-written texts with excellent spelling, that is why you should no longer trust an email that does not have flaws in this regard. However, there are other aspects to consider to identify a potential email phishing attack:

  • The sender does not have an official email address for the company or replaces letters with special characters.
  • The message motivates you to take action urgently. Normally, you are invited to download a file, enter a link or share personal data.
  • The message is out of context and the communication makes sense, asking to perform an action that has a different procedure or that is not requested by that means.
  • Spontaneous benefits are offered, such as raffles, gifts or raffles. This is something that happens in emails outside of work environments, but it is possible that it also occurs in this case.
 
For Latest Updates Follow us on Google News
 

-

PREV WhatsApp may block your account if you abuse this type of messages
NEXT Capcom is making more money than ever according to its most recent financial report