dcsimg

How to Spot Phishing Email in 5 Easy Steps

By Paul Mah | Posted February 03, 2012
  • Print Article
  • Email Article

WEBINAR:
On-Demand

Desktop-as-a-Service Designed for Any Cloud ? Nutanix Frame


You may be familiar with the term phishing, but how good are you -- or your employees -- at spotting a phishing attack? Given how effective phishing attacks are at fooling people into divulging personal or company information, it's an important skill to hone to improve small business security -- and one that most people lack.

Our sister site, ITBE.com lays out five simple steps to identify a phishing message in this slideshow.


From the network breach at RSA to theft of intellectual property in Operation Aurora, it is no secret that some of the most visible hacking involves the use of spear phishing. A targeted form of phishing that is custom-made for a specific organization, a spear phishing email message seeks to elicit a desired action that could result in a Trojan being loaded, or the unintended leaking of confidential or privileged data.

Read the complete article: Identify a Phishing Message in Five Steps

Do you have a comment or question about this article or other small business topics in general? Speak out in the SmallBusinessComputing.com Forums. Join the discussion today!

Get free tips, news and advice on how to make technology work harder for your business.

Submit
Learn more
 
You have successfully registered to
Enterprise Apps Daily Newsletter
Thanks for your registration