Skip to content
Awareity
Primary Navigation Menu
Menu
  • Home
  • About
    • About
    • Awareity Butterfly Effect
    • Contact
    • Support
  • Solutions
    • Information Security Training
      • Information Security Awareness Training
      • Awareness and Accountability Vault (AAV)
    • Prevention and Connecting the Dots Platform
    • First Preventers Framework
    • Prevention and GAP Assessment
    • Threat Assessment Teams
    • Climate Surveys
    • Resellers
    • Industries
      • K12
      • Higher Education
      • Diocese
      • Healthcare
      • Government
      • Corporate
  • Blog
  • Info Request

E-mail Spoof Defeats Technology…Are Your People Prepared?

By: Awareity
On: October 30, 2009

According to news reports, a spear-phishing experiment conducted over the past few days has revealed some disturbing new risks for organizations using enterprise e-mail products and services:  Most major enterprise e-mail products and services were unable to detect a fake LinkedIn invitation that looked like it was from Bill Gates inviting people to join his professional network.  Once the ‘victim’ clicked on the ‘invite’ link, they were sent to the phishing site where information about the ‘victim’ was captured.

The article in Dark Reading detailed comments from CEO of PacketFocus including: “I tested the spoofed e-mail on six different enterprise networks using the latest e-mail security technology from most of the major vendors, and not a single one picked up on the spoofed e-mail”.

Why should this story be important to organizational leaders?  Your people (employees, managers, board members, partners, service providers, etc.) could be the ‘victim’ if they are not aware of risks and threats that technology cannot prevent.

What can organizational leaders do to proactively prevent risks that cannot be stopped by technology? Because this is a social-engineering attack on people’s lack of awareness, organizational leaders must implement faster, simpler and better tools to help ensure ongoing awareness at the individual-level.

This experiment represents a ‘red flag’ for organizational leaders to take immediate action before the next phishing e-mail with a fake link leads to a real threat rather than an experiment.

Share this post to help us connect the dots...Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Share on LinkedIn
Linkedin
Email this to someone
email
Print this page
Print
2009-10-30
Previous Post: UCLA Stabbing Puts Focus on College Students' Mental Health
Next Post: Fact or Fiction with Tweets and Web Sites

READ MORE:

WATCH MORE:


Get Solutions For Your Challenges!
 
 
 
 
 
 
Don't worry, we will only call if you request "Phone" as your contact preference. We hate spam calls too!


Not seeing the form to request information? Drop us a line and we'll send you more information!

Recent Blog Posts

Remembering Virginia Tech…and Learning Too

April 19, 2022

The Solution to Harden Cyber Defenses is Patching Your People

April 8, 2022

Next Exit – How I can help YOU

March 3, 2022

The First Preventers Model For Communities, Schools, and Organizations

January 4, 2022

School Board Violence & Challenges

November 8, 2021

Support

Need more information on
Support for AAV or TIPS?

Click here

What are you looking for?

Connect the Dots With Us!

| |

Designed using Dispatch Premium. Powered by WordPress.