For example hackers may employ phishing techniques to impersonate a vendor company that another company does business with. In some cases they even gain access to a system that the hackers are targeting. Phishing is an extremely common technique hackers use to gain important information about specific individuals. They discovered that more than one third of those emails could be classified as phishing. Researchers from F-Secure analyzed more than 200,000 emails that had been flagged as suspicious by employees working for organizations around the world. Employee cyber security training is paying off according to a report recently released by IT security company F-Secure.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |