Now that you know ransomware attacks are on the rise we thought it would be useful to share some real world examples of just how sneaky these email threats can be. Below are three suprisingly common examples of how a cybercriminal can use your own email against you. Even Yahoo! wasn't safe from an email attack.
• A CFO gets an email from the CEO authorizing an emergency fund transfer. But the email is actually from a cybercriminal
• An employee with administrative rights to key systems receives an urgent email from IT to update their network password. They actually disclose their password to cybercriminals.
• An employee receives an email to read an important attachment about their benefits provider. When they open the attachment, they unknowingly activate hidden Trojan malware.
Scared? We get it. Luckily, we have summarized everything you need to know and do to protect you and your data from email threats.
Related Articles:
How to Identify a Phishing Email
Another Day Another Breach. Uber, Fitbit, OKCupid