New release : CTI Report - Pharmaceutical and drug manufacturing 

                 Download now

Best practices – Fight phishing effectively

Best practices – Fight phishing effectively

[et_pb_section fb_built="1" _builder_version="4.4.1"][et_pb_row _builder_version="4.4.1"][et_pb_column type="4_4" _builder_version="4.4.1"][et_pb_image src="https://www.intrinsec.com/wp-content/uploads/2020/03/bonnes_pratiques_phishing.png" align="center" _builder_version="4.4.1" width="55%"][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version="4.4.1"][et_pb_column type="4_4" _builder_version="4.4.1"][et_pb_text _builder_version="4.4.1" text_font="Nunito Sans||||||||" text_font_size="17px" header_3_font="Poppins|600|||||||" header_3_text_color="#59c9a5" header_3_font_size="26px" header_3_line_height="1.8em"]

This cannot be stressed enough, The vast majority of cyberattacks begin with fraudulent emails. (phishing). Therefore, the first step in improving your IT security is to better detect these attacks, and this notably involves raising awareness internally among your employees.

In today's post, discover our reminder with 4 key points to watch out for when recognizing a phishing email as well as Our recommendations on good practices to share with your employees and to adopt in order to protect your business.

Recognizing a fraudulent email in 4 steps:

  • Check the sender's email address: The email address must match the sender's information (check the domain, subdomain, .fr or .com…). Also, be careful of double characters and misspellings (for example, Intrinseec instead of Intrinsec…).
  • Pay attention to the body of the email: Often originating from a foreign language, phishing emails frequently contain spelling mistakes and may also include special characters. The email's design may also differ from usual (poorly framed image, missing image, low-resolution logo, etc.), so pay close attention to these elements.
  • Consider the context of the email: Was it expected? Is it consistent with your situation? Do you know the supposed sender? Often, phishing emails are generic and not necessarily related to your current situation.
  •  However, just because the content seems realistic or relevant to your situation doesn't mean the email isn't fraudulent. So, Also consider the relevance of the content: The information may be stolen or obtained, and coincidence can also occur if the attacker's targeting is precise. Finally, email is generally not the preferred channel for transmitting or requesting private official information (banking, civil, etc.).

Good behaviors to adopt:

  • Do not click on the links And Check the reliability and official nature of their URL. simply hover your mouse over to see the full link.
  • Born Do not download the attachments.
  • Verify the information with the relevant institutions/individuals. via a secure, known and recognized communication channel (official telephone number, official website…).
  • If in doubt, forward the information to the appropriate department. (IT Director, CISO, CERT if you have them, otherwise check with your manager).
  • If the email turns out to be fraudulent: Mark it as junk mail.
  • Practice! Being well prepared for this eventuality allows you to significantly limit the risks coming from your employees. To mitigate the risks associated with humans and their actions, we recommend that you use... cybersecurity awareness campaigns.
  • Plan ahead! Thanks to the services of Cyber Threat Intelligence, you can also Combat phishing by controlling your brand's exposure level and associated risks. 

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built= »1″ _builder_version= »3.22.4″ use_background_color_gradient= »on » background_color_gradient_start= »#c9202b » background_color_gradient_end= »rgba(204,42,45,0.56) »][et_pb_row column_structure= »3_4,1_4″ _builder_version= »3.25″][et_pb_column type= »3_4″ _builder_version= »3.25″ custom_padding= »||| » custom_padding__hover= »||| »][et_pb_text _builder_version= »3.27.4″ text_font= »Nunito Sans|||||||| » text_text_color= »#ffffff » text_font_size= »24px » text_line_height= »1.4em » header_font= »|||||||| » custom_margin= »-11px|||31px » custom_padding= »13px|| »]

Would you like to receive support? Don't hesitate to contact us!

[/et_pb_text][/et_pb_column][et_pb_column type= »1_4″ _builder_version= »3.25″ custom_padding= »||| » custom_padding__hover= »||| »][et_pb_button button_url= »https://www.intrinsec.com/contact » url_new_window= »on » button_text= »Contactez-nous » button_alignment= »left » _builder_version= »3.22.4″ custom_button= »on » button_text_size= »18px » button_text_color= »#e02b20″ button_bg_color= »#ffffff » button_border_color= »#ffffff » button_font= »Nunito Sans|700||||||| » button_icon= »%%86%% » button_icon_color= »#ffffff » button_icon_placement= »left » custom_margin= »10px|15px||17px|| » custom_padding= »|15px|||| »][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]