{"id":5600,"date":"2019-07-16T20:45:56","date_gmt":"2019-07-17T03:45:56","guid":{"rendered":"http:\/\/clikcloud.com\/?p=5895"},"modified":"2019-07-16T21:14:59","modified_gmt":"2019-07-17T04:14:59","slug":"train-your-people-to-fight-cyberattackstrain-your-people-to-fight-cyberattacks","status":"publish","type":"post","link":"https:\/\/clikcloud.net\/3gtelco\/train-your-people-to-fight-cyberattackstrain-your-people-to-fight-cyberattacks\/","title":{"rendered":"Train Your People to Fight CyberattacksTrain Your People to Fight Cyberattacks"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">With the advance of technology, many benefits have come to businesses\u2014commerce taking place twenty-four hours a day and the ability to have meetings with workers half a world away, among others\u2014but cybercriminals have learned to exploit technology, using practices such as phishing (planting a fraudulent link in an email) to gain access to business\u2019s data and networks.\u00a0 With social engineering, Phishing, and Spearfishing on the rise it is important for you to raise employee awareness about these threats. Read on to discover how to keep your business safe from this type of intrusion.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What Phishing is and How to Prevent It<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Phishing is an increasingly popular way for attackers to access company data and plant malware in a network. A phishing attempt involves putting a fraudulent link in an email to get the recipient to click on the link and unwittingly import malware into their company\u2019s network. Spear phishing, a related type of attack, focuses on an organization or individual. Employees can be trained to recognize an attempt by looking for clues. One is misspellings and grammatical errors in the message. Another tipoff is a strange or suspicious sender\u2019s address; if it looks strange or suspicious, don\u2019t open the email. Yet another practice is to point the mouse arrow over a link to look at it without clicking. All are things an individual can do, and there are additional effective practices.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Focus on the Fundamentals<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The best preventive measures are simple. According to a CompTIA<\/span><a href=\"http:\/\/certification.comptia.org\/it-career-news\/post\/view\/2019\/06\/28\/cybersecurity-basics\"> <span style=\"font-weight: 400;\">article<\/span><\/a><span style=\"font-weight: 400;\">, getting the basics right is one of the soundest investments a business can make. Prevention, as always, is far less costly than repair. While tools, current antimalware definitions and operating system patches are important, much of your company\u2019s preventive power lies with employees. Developing a culture oriented toward protecting a business\u2019s technological assets is far more effective than placing blame if a phishing attempt gets past defenses. Phishing schemes have become so clever they can catch anyone unaware. An all-day training can be a good start, but the training should be a regular part of your business\u2019 strategy for keeping itself safe.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As technology advances, cyberattack attempts will keep pace. Companies should remember one of their most powerful assets\u2014their people. To learn how to train your employees and develop a culture of security, contact your technology advisor today.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the advance of technology, many benefits have come to businesses&mdash;commerce taking place twenty-four hours a day and the ability to have meetings with workers half a world away, among others&mdash;but cybercriminals have learned to exploit technology, using practices such as phishing (planting a fraudulent link in an email) to gain access to business&rsquo;s data and networks.<\/p>\n","protected":false},"author":1,"featured_media":5516,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[5,100],"tags":[21],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Train Your People to Fight CyberattacksTrain Your People to Fight Cyberattacks<\/title>\n<meta name=\"description\" content=\"With the advance of technology, many benefits have come to businesses&mdash;commerce taking place twenty-four hours a day and the ability to have meetings with workers half a world away, among others&mdash;but cybercriminals have learned to exploit technology, using practices such as phishing (planting a fraudulent link in an email) to gain access to business&rsquo;s data and networks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clikcloud.net\/3gtelco\/train-your-people-to-fight-cyberattackstrain-your-people-to-fight-cyberattacks\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"clikcloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/train-your-people-to-fight-cyberattackstrain-your-people-to-fight-cyberattacks\/\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/train-your-people-to-fight-cyberattackstrain-your-people-to-fight-cyberattacks\/\",\"name\":\"Train Your People to Fight CyberattacksTrain Your People to Fight Cyberattacks\",\"isPartOf\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\"},\"datePublished\":\"2019-07-17T03:45:56+00:00\",\"dateModified\":\"2019-07-17T04:14:59+00:00\",\"author\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\"},\"description\":\"With the advance of technology, many benefits have come to businesses&mdash;commerce taking place twenty-four hours a day and the ability to have meetings with workers half a world away, among others&mdash;but cybercriminals have learned to exploit technology, using practices such as phishing (planting a fraudulent link in an email) to gain access to business&rsquo;s data and networks.\",\"breadcrumb\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/train-your-people-to-fight-cyberattackstrain-your-people-to-fight-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clikcloud.net\/3gtelco\/train-your-people-to-fight-cyberattackstrain-your-people-to-fight-cyberattacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/train-your-people-to-fight-cyberattackstrain-your-people-to-fight-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clikcloud.net\/3gtelco\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Train Your People to Fight CyberattacksTrain Your People to Fight Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/\",\"name\":\"3G Master (3gtelco)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\",\"name\":\"clikcloud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"caption\":\"clikcloud\"},\"sameAs\":[\"http:\/\/www.clikcloud.com\"],\"url\":\"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Train Your People to Fight CyberattacksTrain Your People to Fight Cyberattacks","description":"With the advance of technology, many benefits have come to businesses&mdash;commerce taking place twenty-four hours a day and the ability to have meetings with workers half a world away, among others&mdash;but cybercriminals have learned to exploit technology, using practices such as phishing (planting a fraudulent link in an email) to gain access to business&rsquo;s data and networks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clikcloud.net\/3gtelco\/train-your-people-to-fight-cyberattackstrain-your-people-to-fight-cyberattacks\/","twitter_misc":{"Written by":"clikcloud","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clikcloud.net\/3gtelco\/train-your-people-to-fight-cyberattackstrain-your-people-to-fight-cyberattacks\/","url":"https:\/\/clikcloud.net\/3gtelco\/train-your-people-to-fight-cyberattackstrain-your-people-to-fight-cyberattacks\/","name":"Train Your People to Fight CyberattacksTrain Your People to Fight Cyberattacks","isPartOf":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#website"},"datePublished":"2019-07-17T03:45:56+00:00","dateModified":"2019-07-17T04:14:59+00:00","author":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92"},"description":"With the advance of technology, many benefits have come to businesses&mdash;commerce taking place twenty-four hours a day and the ability to have meetings with workers half a world away, among others&mdash;but cybercriminals have learned to exploit technology, using practices such as phishing (planting a fraudulent link in an email) to gain access to business&rsquo;s data and networks.","breadcrumb":{"@id":"https:\/\/clikcloud.net\/3gtelco\/train-your-people-to-fight-cyberattackstrain-your-people-to-fight-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clikcloud.net\/3gtelco\/train-your-people-to-fight-cyberattackstrain-your-people-to-fight-cyberattacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clikcloud.net\/3gtelco\/train-your-people-to-fight-cyberattackstrain-your-people-to-fight-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clikcloud.net\/3gtelco\/"},{"@type":"ListItem","position":2,"name":"Train Your People to Fight CyberattacksTrain Your People to Fight Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/clikcloud.net\/3gtelco\/#website","url":"https:\/\/clikcloud.net\/3gtelco\/","name":"3G Master (3gtelco)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92","name":"clikcloud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","caption":"clikcloud"},"sameAs":["http:\/\/www.clikcloud.com"],"url":"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/"}]}},"_links":{"self":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5600"}],"collection":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/comments?post=5600"}],"version-history":[{"count":1,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5600\/revisions"}],"predecessor-version":[{"id":5601,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5600\/revisions\/5601"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media\/5516"}],"wp:attachment":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media?parent=5600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/categories?post=5600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/tags?post=5600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}