
We’re ringing in National Cyber Security Awareness Month and European Cyber Security Month with an infographic to help spread awareness of one of the greatest and most common threats to computer users of all kinds: phishing attacks.
October is just around the corner, bringing with it a month-long effort in the US and Europe to improve awareness of cyber security and the threats we all encounter in our digital lives. To do our part in spreading cyber security awareness, we’ve created an infographic covering phishing attacks in their many forms and what users can do to protect themselves against this highly common online threat.
Phishing attacks are by no means a new issue, but rather one that has plagued individuals and businesses for many years. In fact, the 2016 Verizon Data Breach Investigations Report found that 58% of incidents involving compromised user credentials utilized phishing attacks. As these attacks continue to increase in frequency and sophistication, it is of critical importance that end users and businesses learn some of the telltale signs of phishing and how to react when they are being targeted.
So how can users recognize and avoid this threat? Check out our infographic below and remember to STOP. THINK. CONNECT.!
Infographic by Digital Guardian
Author

- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Latest Articles
Blog2022.12.13What are the Common Security Weaknesses of Cloud Based Networks?
Blog2022.10.12Vulnerability management with Wazuh open source XDR
Blog2022.08.29Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
Blog2022.08.25Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky
Subscribe
0 Comments