Home  /  Resources  /  Blog  /  Cloud Computing  /  Watch Out For Email Phishing: Learn About The Importance of Email Security Training

Watch Out For Email Phishing: Learn About The Importance of Email Security Training

Relevance

While we are all trying to do our part to alleviate the spread of the coronavirus (COVID-19), some have taken advantage of the crisis by sending coronavirus related phishing emails to companies nationwide. These emails can include fake hyperlinks to maps showing infected areas/rates or legitimate government agency names, warnings to download COVID-19 related documents, or links to a hospital or healthcare institution.

Whatever it may be, Corporate Technologies wants to ensure you and the rest of your organization are well-prepared and ready to handle this threat. Therefore, we’ve compiled the top 5 tips to combat email phishing: 

  1. Look at the email address it was sent from. Is anything misspelled or full of jumbled letters? 
  2. Use link hovering to verify the final destination of any links. You can do this by simply hovering your mouse over the link and reading the URL (web address) at the bottom left-hand corner of the screen.
  3. Never open attachments or click on links unless you’ve verified that they’ve come from a trusted source.  
  4. If you clicked on a malicious link or attachment, change your password immediately and contact our Help Desk.
  5. Train yourself and your team on identifying phishing emails with mock phishing scenarios

 

Email Security Training

Email security training is for employees to develop security awareness. We use and offer a service that allows you to test and train your users to minimize the dangerous risks of social engineering, phishing, and ransomware attacks. This service provides thousands of phishing templates that you send to your users to test their attentiveness. Your organization will be provided with security awareness test reports that show each user’s clicking, replying, data entering, reporting, and attachment opening activity. This information is used to generate a phishing-prone percentage which informs you on their phishing detection and consciousness.

Social Engineering– when a hacker manipulates, influences, or deceives you to gain access to your system

Phishing– attempting to gain sensitive information (usernames and passwords) by disguising as trustworthy sites

Ransomware– malware t­hat locks users out of their devices or blocks access to files potentially until money or ransom is paid

 

 

 

Contact Us!

Here at Corporate Technologies, we offer our customers Email Security Training as an add-on. Especially during this pandemic, this could certainly be beneficial for your company’s users. Contact us today to find out more!

 

“We were hit with ransomware last September & although extremely stressful we received exceptional response in recovering our data … We wouldn’t be in business right now without Corporate Technologies.”

-Steve Schoonmaker

Read more blog posts

Interested In Pricing? Have a Question? Talk to an Expert Today!

IT Services Near Me