Blogs By this
author
- Embracing the Modern Workplace
- Unlock Business Agility with Outsourced IT Services
- Social Engineering Attacks: Proofpoint’s 2022 Social Engineering Report
- Increasing Email Security to Avoid Business Email Compromise
- How to Protect Yourself Against Ransomware Attacks
- Cyber Security Risk Management – Threats are Evolving Much Faster Than Australian Businesses
- How to Avoid Being Scammed Online
- AWS Migration Competency – recognition of Comunet’s leadership and expertise in cloud migration services
- Myth Busting Cloud Security – How Secure is the Cloud?
- The Log4j Vulnerability: What Happened and What’s the Impact
- The Software Development Life Cycle
- What is a Business Analyst and what do they do?
- Christmas Cyber Security Tips
- Off the Shelf vs Custom Software – 7 Things to Consider
- The COVID-19 digital vaccination certificate and the value of cyber security audits
- Comunet and AWS – delivering secure, scalable and trustworthy services non-profits
Related blogs
to this blog
- What is ISO 27001 Certification?
- Protect Your Business: The Essential Eight and Beyond
- An Overview of ISO 27001:2022
- Social Engineering Attacks: Proofpoint’s 2022 Social Engineering Report
- Increasing Email Security to Avoid Business Email Compromise
- How to Protect Yourself Against Ransomware Attacks
- Cyber Security Risk Management – Threats are Evolving Much Faster Than Australian Businesses
- How to Avoid Being Scammed Online
- Myth Busting Cloud Security – How Secure is the Cloud?
- The Log4j Vulnerability: What Happened and What’s the Impact
- Christmas Cyber Security Tips
- The COVID-19 digital vaccination certificate and the value of cyber security audits
- Passwords are not enough – why you need Multi Factor Authentication
- Building innovation culture
- Getting out of the swamp: Accelerated Data Lake on AWS
User awareness and education continue to be one of the biggest obstacles to cyber security today and this has been repeatedly highlighted in a rainbow spectrum of bright fluorescent colours all over local cyber news this month. Phishing for dream job offers are explicitly preying on the unwary and Australia wide scamming losses are at a record high. Fake emails from global job seeker and networking service LinkedIn have exploded in the first quarter of 2022. Cyber security company Checkpoint discovered that LinkedIn imitations made up 52% of global phishing attacks so far this year – six times higher than in 2021 where it accounted for 8%.
While there are many email filtering systems to help prevent phishing attacks, we will always rely on user education and training as the final step.
- If you are not expecting e-mail from LinkedIn, do not open e-mails from LinkedIn.
- If you suspect an e-mail is legitimate but you are uncertain, here are some tips from Microsoft on how to spot a phishing e-mail.
- Be suspicious of unexpected e-mail particularly from social media platforms, shopping/shipping services, and online service providers like Google and Microsoft.
Checkpoint’s list of most imitated companies Q1 2022
1. LinkedIn (relating to 52% of all phishing attacks globally)
2. DHL (14%)
3. Google (7%)
4. Microsoft (6%)
5. FedEx (6%)
6. WhatsApp (4%)
7. Amazon (2%)
8. Maersk (1%)
9. AliExpress (0.8%)