{"id":14708,"date":"2021-10-11T12:08:42","date_gmt":"2021-10-11T16:08:42","guid":{"rendered":"https:\/\/technology.wooster.edu\/?p=14708"},"modified":"2024-03-13T15:20:03","modified_gmt":"2024-03-13T19:20:03","slug":"fundamentals-for-shoring-up-phising-defenses","status":"publish","type":"post","link":"https:\/\/inside.wooster.edu\/technology\/fundamentals-for-shoring-up-phising-defenses\/","title":{"rendered":"Fundamentals for Shoring Up Phishing Defenses"},"content":{"rendered":"\n<p>According to National Cybersecurity Alliance, phishing is one of the oldest forms of cyber-attacks that continues to grow. In fact, <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">43 percent<\/a> of cyberattacks in 2020 featured phishing or pre-texting, while <a href=\"https:\/\/www.proofpoint.com\/us\/resources\/threat-reports\/state-of-phish\">74 percent<\/a> of US organizations experienced a successful phishing attack last year alone. That means that phishing is one of the most dangerous cyber-attacks to an organization\u2019s cybersecurity health. As a result, the need for proper anti-phishing hygiene and best practices is an absolute must.<\/p>\n\n\n\n<p>With that in mind, here are a few quick best practices and tips for dealing with phishing threats at The College of Wooster and beyond.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"know-the-red-flags\">Know the Red Flags<\/h2>\n\n\n<p>Phishes are masters of making their content and interactions appealing. From content design to language, it can be difficult to discern whether content is genuine or a potential threat, which is why it is so important to know the red flags. Awkward and unusual formatting, overly explicit call outs to click a hyperlink or open an attachment and subject lines that create a sense of urgency are all hallmarks that the content you received could be potentially from phish and indicate that it should be handled with caution.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/CyberRedFlags.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"787\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/CyberRedFlags-1024x787.png\" alt=\"Red swirling background with the text KnowBe4 \"Emial Phishing Red Flags\" it has an example email with bubbles telling you to hover over the link, tells you to click a link or open an attachment, and sense of urgency.\" class=\"wp-image-14724\" srcset=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/CyberRedFlags-1024x787.png 1024w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/CyberRedFlags-300x231.png 300w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/CyberRedFlags-768x590.png 768w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/CyberRedFlags-1536x1181.png 1536w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/CyberRedFlags-2048x1575.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption>KnowBe4 Email Phishing Red Flags<\/figcaption><\/figure>\n\n\n<h2 class=\"wp-block-heading\" id=\"verify-the-source\"><strong>Verify the Source<\/strong><\/h2>\n\n\n<p>Phishing content comes in a variety of ways; however, many phishes will try to impersonate someone you may already know &#8212; such as a colleague, service provider or friend &#8212; to trick you into believing their malicious content is trustworthy. Don\u2019t fall for it. If you sense any red flags that something may be out of place or unusual, don&#8217;t click on anything and reach out to the Help Desk to notify us of a potential phishing scam.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/phishing-sceam.png\"><img loading=\"lazy\" decoding=\"async\" width=\"472\" height=\"496\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/phishing-sceam.png\" alt=\"Screenshot of a phishing email that was received at The College of Wooster.\" class=\"wp-image-14725\" srcset=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/phishing-sceam.png 472w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/phishing-sceam-285x300.png 285w\" sizes=\"auto, (max-width: 472px) 100vw, 472px\" \/><\/a><figcaption>Actual Phishing Email Received at The College of Wooster<\/figcaption><\/figure>\n\n\n<h2 class=\"wp-block-heading\" id=\"be-aware-of-vishing-and-other-phishing-offshoots\"><strong>Be Aware of Vishing and Other Phishing Offshoots<\/strong><\/h2>\n\n\n<p>Phishes have diversified their phishing efforts beyond traditional email. For example, voice phishing &#8212; or vishing &#8212; has become a primary alternative looking to gain sensitive information from unsuspecting individuals. Like conventional phishing, vishing is typically executed by individuals posing as a legitimate organization &#8212; such as a healthcare provider or insurer &#8212; and asking for sensitive information. Simply put, it is imperative that you be wary of any sort of communication that asks for personal information whether it be via email, phone, or chat &#8212; especially if the communication is unexpected. If anything seems suspicious, again, break-off the interaction immediately and contact the company directly to confirm the veracity of the communications.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusions\">Conclusions<\/h2>\n\n\n<p>Phishing may be \u201cone of the oldest tricks in the book,\u201d but it is still incredibly effective. And although it may seem hard to spot, by exercising caution and deploying these few fundamentals, you can reduce your risk of falling for a phishing attack. Don&#8217;t get phished.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to National Cybersecurity Alliance, phishing is one of the oldest forms of cyber-attacks that continues to grow. In fact, 43 percent of cyberattacks in 2020 featured phishing or pre-texting, while 74 percent of US organizations experienced a successful phishing attack last year alone. That means that phishing is one of the most dangerous cyber-attacks [&hellip;]<\/p>\n","protected":false},"author":26,"featured_media":14727,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[12],"tags":[],"coauthors":[419],"class_list":["post-14708","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"gutentor_comment":0,"featured_image_urls":{"full":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/Week-2_-Fight-the-Phish1.png",940,788,false],"thumbnail":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/Week-2_-Fight-the-Phish1-150x150.png",150,150,true],"medium":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/Week-2_-Fight-the-Phish1-300x251.png",300,251,true],"medium_large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/Week-2_-Fight-the-Phish1-768x644.png",768,644,true],"large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/Week-2_-Fight-the-Phish1.png",940,788,false],"1536x1536":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/Week-2_-Fight-the-Phish1.png",940,788,false],"2048x2048":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/Week-2_-Fight-the-Phish1.png",940,788,false]},"post_excerpt_stackable":"<p>According to National Cybersecurity Alliance, phishing is one of the oldest forms of cyber-attacks that continues to grow. In fact, 43 percent of cyberattacks in 2020 featured phishing or pre-texting, while 74 percent of US organizations experienced a successful phishing attack last year alone. That means that phishing is one of the most dangerous cyber-attacks to an organization\u2019s cybersecurity health. As a result, the need for proper anti-phishing hygiene and best practices is an absolute must. With that in mind, here are a few quick best practices and tips for dealing with phishing threats at The College of Wooster and&hellip;<\/p>\n","category_list":"<a href=\"https:\/\/inside.wooster.edu\/technology\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>","author_info":{"name":"Megan Smeznik (she\/her\/hers)","url":"https:\/\/inside.wooster.edu\/technology\/author\/msmeznikwooster-edu\/"},"comments_num":"0 comments","uagb_featured_image_src":{"full":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/Week-2_-Fight-the-Phish1.png",940,788,false],"thumbnail":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/Week-2_-Fight-the-Phish1-150x150.png",150,150,true],"medium":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/Week-2_-Fight-the-Phish1-300x251.png",300,251,true],"medium_large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/Week-2_-Fight-the-Phish1-768x644.png",768,644,true],"large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/Week-2_-Fight-the-Phish1.png",940,788,false],"1536x1536":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/Week-2_-Fight-the-Phish1.png",940,788,false],"2048x2048":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2021\/10\/Week-2_-Fight-the-Phish1.png",940,788,false]},"uagb_author_info":{"display_name":"Megan Smeznik (she\/her\/hers)","author_link":"https:\/\/inside.wooster.edu\/technology\/author\/msmeznikwooster-edu\/"},"uagb_comment_info":0,"uagb_excerpt":"According to National Cybersecurity Alliance, phishing is one of the oldest forms of cyber-attacks that continues to grow. In fact, 43 percent of cyberattacks in 2020 featured phishing or pre-texting, while 74 percent of US organizations experienced a successful phishing attack last year alone. That means that phishing is one of the most dangerous cyber-attacks&hellip;","_links":{"self":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts\/14708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/comments?post=14708"}],"version-history":[{"count":4,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts\/14708\/revisions"}],"predecessor-version":[{"id":44008,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts\/14708\/revisions\/44008"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/media\/14727"}],"wp:attachment":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/media?parent=14708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/categories?post=14708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/tags?post=14708"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/coauthors?post=14708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}