Difference between revisions of "Phishing"
From MgmtWiki
(Created page with "==Full Title or Meme== Using social connections to acquired digital credentials. ==Context== ==Solutions== * This is perhaps the only Vulnerability that can and must be...") |
|||
(5 intermediate revisions by the same user not shown) | |||
Line 5: | Line 5: | ||
==Solutions== | ==Solutions== | ||
− | * This is perhaps the only [[Vulnerability]] that can and must be addressed by better | + | * This is perhaps the only [[Vulnerability]] that can and must be addressed by better [[User Education]]. Although a good [[Artificial Intelligence]] could certainly help. |
− | * Phishing - Avoid Getting Hooked] NIST NCCoE Buzz (2022-06-16) <blockquote>Are you looking to protect your enterprise data from phishing? According to the Cybersecurity & Infrastructure Security Agency (CISA), most phishing attempts come by email, while other attacks—including text messages (SMS)—are also on the rise. Awareness of the different types of phishing attacks are key for implementing comprehensive mobile device security. | + | * Phishing - Avoid Getting Hooked] NIST NCCoE Buzz (2022-06-16) <blockquote>Are you looking to protect your enterprise data from phishing? According to the [https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMjA2MTYuNTk0NzYyNDEiLCJ1cmwiOiJodHRwczovL3d3dy5jaXNhLmdvdi91c2NlcnQvbmNhcy9hbGVydHMvYWEyMC0wOTlhIn0.d0CFNUN6QHaF6DTxBq4jr9u2NAuh62F1CQ4IOL_zr6E/s/630523344/br/133043878869-l Cybersecurity & Infrastructure Security Agency (CISA)], most phishing attempts come by email, while other attacks—including text messages (SMS)—are also on the rise. Awareness of the different types of phishing attacks are key for implementing comprehensive mobile device security. It is important to keep in mind that cybercriminals target a range of vulnerable actors: individuals, small and medium enterprises, and large organizations. Ultimately, any of us could be affected. Phishing attacks are not just limited to laptops or desktops; mobile phones can be the target of phishing attacks as well. [https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMjA2MTYuNTk0NzYyNDEiLCJ1cmwiOiJodHRwczovL3d3dy5uY2NvZS5uaXN0Lmdvdi9tb2JpbGUtZGV2aWNlLXNlY3VyaXR5In0.XLOg6SC0djLivAaGthD-9pZTP880txtZhVAfaiITH6I/s/630523344/br/133043878869-lThe National Cybersecurity Center of Excellence (NCCoE)] has developed guidance to help protect mobile devices from phishing threats. We provide example solution architectures that organizations can use to help improve their information security and privacy. To learn more about how to protect your mobile device from phishing attacks, view our latest short form paper on phishing protection. To learn more about the work we do at the NCCoE, visit our Mobile Device Security web page here. </blockquote> |
− | |||
− | It is important to keep in mind that cybercriminals target a range of vulnerable actors: individuals, small and medium enterprises, and large organizations. Ultimately, any of us could be affected. Phishing attacks are not just limited to laptops or desktops; mobile phones can be the target of phishing attacks as well. | ||
− | |||
− | |||
− | |||
− | To learn more about the work we do at the NCCoE, visit our Mobile Device Security web page here. </blockquote> | ||
==Preferences== | ==Preferences== | ||
+ | * See also the wiki page on [[Quishing]] which is a variant that uses [[QR Code]]s to get unsuspecting user to go places they really do not want to go. | ||
[[Category: Vulnerability]] | [[Category: Vulnerability]] | ||
+ | [[Category: Attack]] |
Latest revision as of 18:58, 15 January 2024
Full Title or Meme
Using social connections to acquired digital credentials.
Context
Solutions
- This is perhaps the only Vulnerability that can and must be addressed by better User Education. Although a good Artificial Intelligence could certainly help.
- Phishing - Avoid Getting Hooked] NIST NCCoE Buzz (2022-06-16)
Are you looking to protect your enterprise data from phishing? According to the Cybersecurity & Infrastructure Security Agency (CISA), most phishing attempts come by email, while other attacks—including text messages (SMS)—are also on the rise. Awareness of the different types of phishing attacks are key for implementing comprehensive mobile device security. It is important to keep in mind that cybercriminals target a range of vulnerable actors: individuals, small and medium enterprises, and large organizations. Ultimately, any of us could be affected. Phishing attacks are not just limited to laptops or desktops; mobile phones can be the target of phishing attacks as well. National Cybersecurity Center of Excellence (NCCoE) has developed guidance to help protect mobile devices from phishing threats. We provide example solution architectures that organizations can use to help improve their information security and privacy. To learn more about how to protect your mobile device from phishing attacks, view our latest short form paper on phishing protection. To learn more about the work we do at the NCCoE, visit our Mobile Device Security web page here.