Reprinted with Permission from Behind the Counter, a Community Journals Publishing Group
The risks organizations face from cyber threats are at epidemic levels. The threats are sophisticated, attack your weakest links (your employees) and are continuing to evolve at an alarming rate. Here are some of the most effective cyber scams EDTS Cyber sees facing organizations today.
In the world of risk…specifically risk mitigation, cyber insurance is the last chapter in your cybersecurity playbook. Let me explain: The goal of any security plan is to mitigate (stop or reduce) threats as much as possible. In a network, that means layered tools (firewall, anti-virus, backups), etc., along with policies, user education and other techniques. After implementing these active threat stopping and deterring steps, and therefore reducing your threat landscape to the lowest possible point (for your particular business needs), then employ a cybersecurity policy to transfer the remaining risk to an insurance company.
Phishing is a social engineering tactic used by hackers to gain access to a network through an unsuspecting email click or attachment download. Since 91% of breaches in 2017 began with an email, you can bet that email phishing is toward the top of your IT department's list of security threats.
If phishing is feared, then it's safe to say that spear phishing is abhorred. Spear phishing is essentially well-researched phishing.