white decorative stripes white decorative stripes
Pedabista

PEDABIN BLOGI

Tervetuloa Pedabin maailmaan

DO YOU TRUST YOUR EMAIL?

90% of all security attacks start with phishing. A successful phishing attack is just the beginning of your problem. These types of attacks are more often than not used so the hacker get a foot in the door and later can execute bigger attacks.

From Hollywood movies we often see extremely dramatic attacks, someone who breaks a difficult code or enters a building through the roof. In reality, that is not how attacks go down. 

Cyber criminals care about security and ROI just like most businesses do. Sending an email is a lot safer and far more profitable than most other methods. The average time it takes before the first click in a phishing email is 100 seconds. That means that in less than two minutes the hacker knows whether the attack has been successful or not.

How to misuse email?
The most known method is probably fake links but email has become far more flexible over the years and phishing attacks now use a series of methods other than fake links. Social engineering is a method where the cyber criminal use technology to reach humans and try to gather personal information.

We are all social beeings and happily share information about our company online. This can be abused by the hacker. They can figure out when a company attends trade shows or how the boss speaks through reading quotes and learn their wording. This is information they utilize when they carry out attacks.

A fourth method cybercriminals use is leakage of sensitive information. This does not necessarily happens because the hacker is interested in the information, even though industrial espionage also happens, but because they are interested in the information that is valuable for us. If the hacker get hold of sensitive information, he/she can later use this in a ransomware attack.

Security
To protect oneself from an attack is a lot harder than to carry it out; after all, the hacker only has to succeed once while the company has to stop the hacker from succeeding every single time. Even though phishing might seem as a more harmless form for attack, it is often the first step of a bigger attack. Your company's best chance of stopping it from happening, is to stop them early on.

Want to learn more about ransomware, how cybercriminals operate, what types of businesses are at risk and how to recognize a phishing email? Listen to our recent webinar recording here! 

Henning Gaalaas

Kirjoittanut: Henning Gaalaas

Henning Gaalaas has been working with security for almost 20 years and has a background as a teacher. He is at his best in interaction with the customer. His passion is making security a catalyst for new business opportunities and to make business leaders see opportunities within security. When not at work, he spends time with his family or out in the woods with a fishing rod in his hand.