How to Spot Phishing Email in 5 Easy Steps

Friday Feb 3rd 2012 by Paul Mah
Share:

The five steps in this slideshow will teach you how to identify a phishing attack, protect your business and save yourself a lot of aggravation.

You may be familiar with the term phishing, but how good are you -- or your employees -- at spotting a phishing attack? Given how effective phishing attacks are at fooling people into divulging personal or company information, it's an important skill to hone to improve small business security -- and one that most people lack.

Our sister site, ITBE.com lays out five simple steps to identify a phishing message in this slideshow.


From the network breach at RSA to theft of intellectual property in Operation Aurora, it is no secret that some of the most visible hacking involves the use of spear phishing. A targeted form of phishing that is custom-made for a specific organization, a spear phishing email message seeks to elicit a desired action that could result in a Trojan being loaded, or the unintended leaking of confidential or privileged data.

Read the complete article: Identify a Phishing Message in Five Steps

Do you have a comment or question about this article or other small business topics in general? Speak out in the SmallBusinessComputing.com Forums. Join the discussion today!
Share:
Home
Mobile Site | Full Site
Copyright 2017 © QuinStreet Inc. All Rights Reserved