Blog
Topic
All
AIoT
Products and technologies
Industries
All
Education
Logistics
Building
Energy
Sports
Sustainability
Business trends
Cybersecurity
Events
Access control
Trends
LED
Industry News
Company News
Product Announcement
Search blog
Blog
Filter
Cancel
Topic
All
AIoT
Products and technologies
Industries
All
Education
Logistics
Building
Energy
Sports
Sustainability
Business trends
Cybersecurity
Events
Access control
Trends
LED
Industry News
Company News
Product Announcement
Reset
Submit

How to Spot Vulnerabilities Related to Targeted Phishing Attacks

 

Hikvision on 3 Tips to Avoid Security Concerns from Spear Phishing

 

Cybercriminals continue to find new ways to exploit vulnerabilities, and targeted phishing is the subject of the Security magazine story, “The art of targeted phishing: How not to get hooked.”

What is phishing? Phishing attacks have long been an effective way for attackers to trick people into divulging sensitive information or infecting a system with malware. Malware can give an attacker remote access to protected systems and networks, encrypt a user’s data and charge a ransom to decrypt the data, or use that system as part of an attack against other systems.

Targeted phishing attacks direct efforts toward a particular group of people, using social engineering to attempt to get these individuals to divulge sensitive information. By using information from social media or other sources, the targeted phishing emails appear to be familiar or credible. Spear phishing is a type of targeted phishing attack that is focused on a specific person or organization.

From the article: “Not only do targeted attacks make it easier to tailor a lure for victims and make it look more authentic and convincing, but they can also home in on higher-value targets. With spear phishing, attackers can focus on compromising specific business-critical machines or gaining access to higher value business accounts that will score the criminal a larger payday at the end of the attack.”

Hikvision covered spear phishing, and ways to avoid the security concern in this blog: “Part Two: An Overview of Spear Phishing Hacks by Hikvision Senior Director of Cybersecurity.” Below are three tips to help you prevent becoming a victim of spear phishing. Read the entire article for a full list of recommendations.  

  • Never reuse passwords. If you have reused passwords, take time to change them now, before it’s too late. Threat actors buy up username/password lists and start trying to login with the username and password on other sites, like Twitter, Facebook, and Spotify.
     
  • Use two-factor authentication (2FA) or multi-factor authentication (MFA) everywhere possible.
     
  • Use a password manager. This will allow you to make great passwords (20 plus characters) that are unique for every website. And you won’t need to remember any of them.
Cybersecurity

Subscribe to newsletter

Subscribe to our email newsletter to get the latest, trending content from Hikvision

Hikvision.com uses strictly necessary cookies and related technologies to enable the website to function. With your consent, we would also like to use cookies to observe and analyse traffic levels and other metrics / show you targeted advertising / show you advertising on the basis of your location / tailor our website's content. For more information on cookie practices please refer to our cookie policy.

 

Contact Us
Hik-Partner Pro close
Hik-Partner Pro
Security Business Assistant. At Your Fingertips. Learn more
Hik-Partner Pro
Scan and download the app
Hik-Partner Pro
Hik-Partner Pro

Get a better browsing experience

You are using a web browser we don’t support. Please try one of the following options to have a better experience of our web content.