Office/Phishing/Passwords in the workplace
Topics
- Office security
- Phising
- Password managment
Office Security
- Access to the office is controlled by a personal ID tag
- If you see someone at the office that you don't recognize, it's OK to ask them who they are.
- Don't leave/write a password on a post-it attached to your screen, desk, drawer
- Visitors are asked to wait in the Lobby, for you to come and pick them up
...Remember, I am watching you...
What is Phishing?
Phishing is a type of social engineering where an attacker sends a fraudulent ("spoofed") message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim.
As of 2020, phishing is by far the most common attack performed by cyber-criminals, with the FBI's Internet Crime Complaint Centre recording over twice as many incidents of phishing than any other type of computer crime.
https://en.wikipedia.org/wiki/Phishing
Types of phishing
- Email phishing
- Spear phishing
- Whaling and CEO fraud
- Clone phishing
- Voice phishing
- SMS phishing
- Page hijacking
Text
- Email is one of the most common and most successful attacks on the internet
- Emails can contain malicious files like viruses, malware, link to malicious sites, or even try to coerce or convince you to give away personal or business information
- Cybercriminals who use email to attack businesses - are becoming more and more effective at evading detection
Text
Email Do's and Dont's
- Always verify the sender of a message (In Gmail - view original)
- Always hover over web page links (URLs) in email messages to see where they link to – beware URL shortening services (like bit.ly) that may obscure the final website destination
- Be skeptical of messages with odd spelling/grammar, improper logos, or that ask you to upgrade or verify your account
- Report suspicious emails to the CISO (or even better - share a print screen in Slack)
DO
Text
Email Do's and Dont's
- DON'T Open an attachment from an unknown sender. Consider the source and whether or not the file was expected.
- DON'T Click on a link from an unknown sender
-
DON'T Email someone your username or password
- For Example: send username in Slack, and password in Whatups, don't add context, don't use the same service for sensitive information
DON'T
Text
Examples
Text
Spear phising
Targeting a specific organization or person with tailored emails. This is to trick that person to believe that this email is legitemate
Text
Whaling and CEO fraud
Targeting the executive team or high profile target directly - the message will be crafted specifically. CEO fraud is spoofing and email from an executive to the CEO
Text
Clone phishing
Clone phishing is a type of phishing attack whereby a legitimate, and previously delivered email containing an attachment or link has had its content and recipient address(es) taken and used to create an almost identical or cloned email.
Then some of the links will be replaced to point to other sites.
Example:
https://www.discountbank.co.il/
will be changed to
https://www.discountbanc.co.il/
Text
Voice phishing
Using an official-sounding recording with the help of text to speech application convincing people to input personal credentials
This is a sophisticated social engineering attack vector
In Israel, this is very popular with Gama'ch and another type of donation - You think you are approached by a legitimate party while in reality, it is a criminal outfit.
Text
SMS phishing
Sending links via SMS (where you can't check the actual path of it), and there by hijacking accounts
Text
Page hijacking
Altering a legitimate site, to replace links, or actual behavior
Example
A browser plugin changes the HTML of the google results page - Very common in the Ad tech industry.
Passwords
Following National Institute of Standards and Technology (NIST) guidelines
-
Length > Complexity
- Conventional wisdom says that a complex password is more secure. But in reality, password length is a much more important factor because a longer password is harder to decrypt if stolen.
Passwords
Following National Institute of Standards and Technology (NIST) guidelines
- Use a password manager (Not the one in the browser)
- Use passphrases any time the system allows it. Passphrases are much harder for a computer to guess than passwords, and much easier for you to remember.
Google Quiz
a task for eveybody
Phishing in the workplace
By Eyal Mrejen
Phishing in the workplace
- 124