The most common method of cyber phishing
What is email?
This type of malware encrypts files and demands money for their return.
What is ransomware?
The process of converting data into a coded format to prevent unauthorized access.
What is Encryption?
The most commonly targeted departments by this type of cyberattack.
What are the finance and accounting departments?
Outsiders gaining access to data systems, breach of PHI and payment data, business email compromise
What are the consequences of phishing?
One of the best defenses against ransomware attacks. It involves regularly saving copies of important data.
What are data backups?
A security process that requires two different forms of identification to access a system or account, typically a password plus a secondary code.
What is two-factor authentication?
About $4 billion
How much was lost due to business email compromise scams last year?
Suspicious links, unexpected attachments, or requests for sensitive information.
What are red flags in phishing emails?
A common 'currency' demanded in Cyber Ransom events.
What is Bitcoin?
A service that encrypts your internet connection and routes it through a remote server, providing privacy and security, especially when using public networks
What is a VPN?
A secondary communication channel
What is a phone call or other follow up communication to verify authenticity?
Check the sender's address, verify its authenticity and think carefully
What should you do before forwarding any email?
The average ransom demand in corporate attacks was about this amount in 2023.
What is $1 million?
This type of attack overwhelms a network with traffic to make services unavailable.
What is a Distributed Denial of Service (DDoS) attack?
"Urgent payment request," "Immediate wire transfer needed," or "Change in payment details."
Common Subject Lines in Business Compromise Emails
What is spear-phishing?
This targeted phishing attack uses personal information to make it more convincing.
This term describes ransomware attacks where hackers both encrypt files and threaten to leak data.
What is double extortion?
A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
What is a Firewall?
A cyber attacker can do this to obscure the true sender of an email.
What is Spoofing?