cybersecurity

Welcome to the Cyber Security Information,Training & Reporting Platform

Report a cyberthreat

Phishing

Phishing is an attempt to gain sensitive information while posing as a trustworthycontact, for example a bank or online service.Spear phishing is a highly targeted attempt to gain information from an individual.Phishing emails may look completely convincing, often with faultless wording and genuine logos. There is a form of spear phishing, where a fake email from a CEO applies pressure on a CFO into making an urgent payment, this has become known as Whaling. It is worth considering ways to add additional safeguards to protect the identity of CEOsand CFOs  o prevent impersonation. Here are a few steps you can use to protect yourself.
• Keep in mind that companies simply do not ask for sensitive information.
• Be suspicious of unexpected emails.
• Make use of anti-malware software.
• Make sure you have spam filters turned on.Check them regularly in case they haveaccidentally trapped an innocent email.

Test your cybersecurity Knowledge

/5
0
Created on

Uncategorized

Cyber

1 / 5

Category: Uncategorized

Which of the following should you do to restrict access to your devices and data?

2 / 5

Category: Uncategorized

What kind of cybersecurity risks can be mitigated by using a VPN?

3 / 5

Category: Uncategorized

Turning off the GPS of your device prevents any tracking of your location.

4 / 5

Category: Uncategorized

Cybercriminals access someone's system and encrypt their personal data and files. The user is unable to access data unless they pay cybercriminals to decrypt the files. It is known as

5 / 5

Category: Uncategorized

Which of these is an example of a phishing attack?

Your score is

The average score is 0%

0%