2o second rule for email security
DB Cybersecurity uses advanced technology to detect camouflaged malware before it strikes; even previously unseen malware. The truth is, hackers know they have a decent chance of success when hiding in plain sight.
Phishing attacks arrive in our busy inboxes as attention-grabbing messages, updates, or promotions. Cyber Criminals use the most powerful marketing strategies of FOMO – Fear of Missing Out and FUD – Fear-Uncertainty-Doubt to entice you to open and click. All it takes is one innocent click by an employee to bring business to a halt.
The danger is even higher with mobile device usage because most people are unaware that their mobile phone settings come factory default to automatically download images. Malware is often encoded into images and when you open an email on your cell phone with such a file the game is over. They own you. To prevent this you can turn off the option to automatically download pictures.
When you are on your computer, determine if the email text/html based or is it a picture? You can check this by hovering over just the edge portions or somewhere there is no text, like in between paragraphs. If the mouse pointer turns into a hand then it is likely a picture or screenshot. If this is the case look to the bottom of the screen usually at the left and you will see a url that the picture points to. When you see these signs move cautiously. and DO NOT CLICK on any part of the email/picture. I recommend calling the person on the phone to verify they sent the email. Look up their number separately, do not use the number or email address that is shown in the email.. Yeah, it’s a pain but it could avoid a catastrophe.
One of the best and simplest techniques to use is the 20-Second-Rule. Use it religiously and you will be able to avoid most phishing attacks.
So what is the 20 second rule? It is really quite simple and effective. It starts as soon as you see the email in your inbox. Take a second to think about what it is saying to you with both the subject line and the sender. Do you know this sender? If you are sure you know this sender and the subject line seems like the type and style of emails you normally get from them then preview the message.
Below is a list of things to watch out for
- WATCH FOR OVERLY GENERIC CONTENT AND GREETINGS
Cyber criminals will send a large batch of emails. Look for
examples like “Dear valued customer.”
- NOTICE MISSPELLINGS, INCORRECT GRAMMAR, & ODD
This might be a deliberate attempt to try to bypass spam
- EXAMINE THE ENTIRE FROM EMAIL ADDRESS
The first part of the email address may be legitimate but the
last part might be off by letter or may include a number in
the usual domain.
- CHECK FOR SECURE WEBSITES
Any webpage where you enter personal information should
have a url with https://. The “s” stands for secure.
- LOOK FOR URGENCY OR DEMANDING ACTIONS
“You’ve won! Click here to redeem prize,” or
“We have your browser history pay now or
we are telling your boss.”
- DON’T CLICK ON ATTACHMENTS RIGHT AWAY
Attachments containing viruses might have an intriguing
message encouraging you to open them such as “Here is
the Schedule I promised.”
- CAREFULLY CHECK ALL LINKS
Mouse over the link and see if the destination matches
where the email implies you will be taken.
Download a FREE Info-Poster you can email to your employees and hang on the wall of your business when you Re-OPEN.