Spider Networks Security Awareness Program

Event Description: Cyber Security awareness on how to stop, Phishing, social media, attacks.

Organizations spend countless sums each year to secure their data and reputation, but even the strongest tools cannot overcome the weakest link: the user. Sophisticated social engineering renders security-savvy users vulnerable to phishing attacks, susceptible to ransomware, and at risk of violating regulatory compliance requirements.

Fortunately, users can become a strong first line of defense if they are continuously educated through security awareness programs. A combination of training, testing through phishing simulations, and alerts, can transform end-users into knowledgeable allies in the fight against bad actors.

The best security awareness programs enable employees to think critically, question communications that don’t seem right, and in general improve their overall security posture. However, implementing a security awareness program can be a long process with many challenges: how to assess the specific needs, develop interesting content, ensure regular updates, measure results

Spider Networks is offering a Cyber security awareness training through the chamber

CLICK HERE TO GO TO THE PEMBROKE PINES CHAMBER UNIVERSITY: TECHNOLOGY SECURITY SITE TO REGISTER

Location:

Broward College Weston Center
4205 Bonaventure Boulevard
Room 220
Weston, FL 33332

View a Map
Date/Time Information:
Friday, January 25, 2019
9:00AM – 11:00AM

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment.

What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It’s one of the oldest types of cyber attacks, dating back to the 1990s, and it’s still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated.

The human element is incredibly important. Adopting an employee testing program and do this training on-going basis. The result isn’t really employee education or security awareness —it’s behavior modification
Think Before You Click! – It’s fine to click on links when you’re on trusted sites. Clicking on links that appear in random emails and instant messages, however, isn’t such a smart move. Hover over links that you are unsure of before clicking on them. Do they lead where they are supposed to lead? A phishing email may claim to be from a legitimate company and when you click the link to the website, it may look exactly like the real website. The email may ask you to fill in the information but the email may not contain your name. Most phishing emails will start with “Dear Customer” so you should be alert when you come across these emails. When in doubt, go directly to the source rather than clicking a potentially dangerous link.
Never Give Out Personal Information – As a general rule, you should never share personal or financially sensitive information over the Internet. This rule spans all the way back to the days of America Online, when users had to be warned constantly due to the success of early phishing scams. When in doubt, go visit the main website of the company in question, get their number and give them a call. Most of the phishing emails will direct you to pages where entries for financial or personal information are required. An Internet user should never make confidential entries through the links provided in the emails. Never send an email with sensitive information to anyone. Make it a habit to check the address of the website. A secure website always starts with “https”.
Use Antivirus Software – There are plenty of reasons to use antivirus software. Special signatures that are included with antivirus software guard against known technology workarounds and loopholes. Just be sure to keep your software up to date. New definitions are added all the time because new scams are also being dreamed up all the time. Anti-spyware and firewall settings should be used to prevent phishing attacks and users should update the programs regularly. Firewall protection prevents access to malicious files by blocking the attacks. Antivirus software scans every file which comes through the Internet to your computer. It helps to prevent damage to your system.

Nobody wants to fall prey to a phishing scam. There’s a good reason that such scams will continue, though: They are successful enough for cybercriminals to make massive profits. Phishing scams have been around practically since the inception of the Internet, and they will not go away any time soon