{"id":1575,"date":"2022-03-02T21:21:55","date_gmt":"2022-03-02T21:21:55","guid":{"rendered":"https:\/\/www.argentxcyber.com\/blog\/?p=1575"},"modified":"2022-03-02T21:45:01","modified_gmt":"2022-03-02T21:45:01","slug":"cybersecurity-emails","status":"publish","type":"post","link":"https:\/\/www.argentxcyber.com\/blog\/index.php\/2022\/03\/02\/cybersecurity-emails\/","title":{"rendered":"Cybersecurity &#8211; 7 Sure Ways You Can Protect Yourself From Email Threats Today!"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Cybersecurity in 2022 is being presented with a growing concern especially since the pandemic and remote working: Email attacks. <\/span><\/p>\n<p><span data-preserver-spaces=\"true\"><span data-contrast=\"none\" xml:lang=\"EN-GB\" lang=\"EN-GB\" class=\"TextRun  BCX0 SCXW184567477\"><span class=\"NormalTextRun  BCX0 SCXW184567477\" data-ccp-charstyle=\"normaltextrun\" data-ccp-charstyle-defn=\"{&quot;ObjectId&quot;:&quot;9d0eef18-065a-499d-bb58-911f3445153f|150&quot;,&quot;ClassId&quot;:1073872969,&quot;Properties&quot;:[469775450,&quot;normaltextrun&quot;,201340122,&quot;1&quot;,134233614,&quot;true&quot;,469778129,&quot;normaltextrun&quot;,469778324,&quot;Default Paragraph Font&quot;]}\">\u2018I hope this email finds you well\u2026\u2019 is a phrase that has become modern-day meme fodder everywhere on social media, especially when it comes on a Monday morning before your refreshing cup of morning tea or coffee<\/span><\/span>. You would typically need a regroup and neatly gather your thoughts before responding and starting your day.\u00a0<\/span><\/p>\n<p><!--more--><\/p>\n<p><span data-preserver-spaces=\"true\">According to <a href=\"https:\/\/www.fortinet.com\/blog\/industry-trends\/commemorating-50-years-of-email-and-how-to-keep-your-email-secure\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff\">Fortinet<\/span><\/a>, approximately 300 billion emails are sent out every single day around the globe. Unfortunately, out of the legitimate ones that hope to find you well every day, some emails could be cyber threats in one way or another.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Now that we are well into 2022, we can still get an odd email from a lost, stranded prince who needs you to wire money to him so he can go home and hopefully refund it to you.\u00a0\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u00a0<\/span><\/p>\n<p><strong>Email Threats You Should Watch out for in 2022\u00a0<\/strong><\/p>\n<p><span data-preserver-spaces=\"true\">\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">With email security, it&#8217;s good to know how to protect yourself in the unfortunate circumstance that this ever happens. The first step is understanding the process and drivers behind malicious emails.\u00a0 \u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u00a0\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Social engineering is a tactic used by malicious actors like the &#8216;lost and stranded prince&#8217; to gain your trust and exploit it for monetary gain, with the medium of choice being casting a wide phishing net through emails. They prey on your curiosity and confidence. It can threaten your business as attackers may also use ransomware as a malicious tactic to extort you to return access to your sensitive data and systems. The goal is not to get to that point!\u00a0\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u00a0 \u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">When it comes to email cybersecurity threats to personal and even corporate email addresses, social engineering manifests itself in the following ways:\u00a0 \u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-preserver-spaces=\"true\"><strong>Phishing<\/strong>: Attackers use email, social media, or SMS to trick victims into divulging sensitive information or directing them to a malicious website to infect your device. They leverage your curiosity. The target in mind is any specific curious end-user.\u00a0\u00a0<\/span><\/li>\n<li><span data-preserver-spaces=\"true\"><strong>Spear phishin<\/strong>g: In this tactic, attackers use research and email as a medium to trick specific members of an organization or particular end-users into giving sensitive information or directing them to a malicious website to infect devices. It is a phishing scam but a well-researched and targeted one.\u00a0\u00a0<\/span><\/li>\n<li><span data-preserver-spaces=\"true\"><strong>CEO Fraud<\/strong>: This is when an attacker impersonates the CEO of an organization through spoofing and usually targets the finance department in the same organization. The goal here is to secure a wire transfer.\u00a0 \u00a0<\/span><\/li>\n<li><span data-preserver-spaces=\"true\"><strong>Whaling<\/strong>: A whaling attack uses sophisticated social engineering techniques to steal confidential or personal data with a financial motivation. The targets are typically executive or heads of government agencies.\u00a0 \u00a0<\/span><\/li>\n<li><span data-preserver-spaces=\"true\"><strong>Business Email Compromise<\/strong>: This is where attackers pose as suppliers and target finance departments in a company, primarily when they typically conduct wire transfers.\u00a0 \u00a0<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>These threats may use a technique called <strong>Domain Spoofing<\/strong>, where they trick the recipient using domains that may appear to look trustworthy. The end goal is to get information and squeeze money out of their victim.<\/p>\n<p><span data-preserver-spaces=\"true\">\u00a0 \u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Now that we know the different forms of email threats, this is how you can minimize the chances of you being a victim:\u00a0\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-preserver-spaces=\"true\">Be vigilant. Anyone sending you suspicious emails claiming to be a person of high status, asking you to send them money, or even expressing a personal interest in you can be a cyber threat. Report the email as spam and permanently delete your spam folder as well.\u00a0 \u00a0<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Always check the email address and do your due diligence by researching the company before responding with any personal information.\u00a0\u00a0<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Hover over hyperlinks before clicking. It is where you can spot inconsistencies and assess the legitimacy of the domain.\u00a0\u00a0<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Suppose the unfamiliar email comes with emojis or grammatical errors. Back away from it. It is a suspicious email.\u00a0 \u00a0<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Configure your email addresses not to download graphic images and do not download attachments from unfamiliar email addresses.\u00a0\u00a0<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Your passwords need to be strong, pass phrased, and never re-used. Also, make a point of setting up a multi-step authenticator as an extra layer of security.\u00a0\u00a0<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Lastly, always follow the cybersecurity rules at work. When in doubt, shout it out. It&#8217;s better to be safe than sorry. <a href=\"https:\/\/www.argentxcyber.com\/blog\/index.php\/2021\/12\/21\/cybersecurity\/\"><span style=\"color: #0000ff\">Here<\/span><\/a> is some more information on teamwork regarding cybersecurity.\u00a0 <\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><span data-preserver-spaces=\"true\">Your email is your primary form of official communication, sensitive information is shared, and it needs a strategy to ensure it&#8217;s secure. A little more knowledge and support can make all the difference to that email finally finding you well permanently! <\/span><span data-preserver-spaces=\"true\">Your email is your primary form of official communication, sensitive information is shared, and it needs a strategy to ensure it&#8217;s secure. <\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span data-preserver-spaces=\"true\">Reach out to us <a href=\"https:\/\/argentxcyber.com\/contact\"><span style=\"color: #0000ff\">here<\/span><\/a>, and we will help you with that. A little more knowledge and support can make all the difference to that email finally finding you well permanently!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity in 2022 is being presented with a growing concern especially since the pandemic and remote working: Email attacks. \u2018I hope this email finds you well\u2026\u2019 is a phrase that has become modern-day meme fodder everywhere on social media, especially when it comes on a Monday morning before your refreshing cup of morning tea or [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":1576,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17,20],"tags":[],"class_list":["post-1575","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","category-strategy"],"_links":{"self":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1575"}],"version-history":[{"count":8,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1575\/revisions"}],"predecessor-version":[{"id":1590,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1575\/revisions\/1590"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/media\/1576"}],"wp:attachment":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}