Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money.
Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes). …show more content…
Some characteristics may be unanticipated or confusing emails, poor spelling or grammar, requests for personal information, requesting to click on links or verify a message doubtfully.
2. Enhance the security of computers
In order to reinforce the company, BWB must establish appropriate security policies or a set of codified standards and implement tools such as antivirus, encryption and patching. Some special software can be install which are specifically designed for phishing such as Kaspersky Internet security, Phish Tank, SmartScreen filter and so on.
3. Use a Password Management Tool
Phishing are made specially to gain usernames and passwords to steal sensitive or confidential information. The passwords management tool can be used to ease the staffs by changing their passwords after each important transactions and send messages for confirmation and their new and unique passwords.
4. Create an Inbound Email Sandbox
Email sandboxing is a security mechanism that executes separately from your operating system and is used to spot principally untrusted attachments, third parties or malicious programs. This system is very recommendable and can be deleted after execution.
Phishing can have impacts on BWB’s business if attacks are