You’re no stranger to the threat of phishing. It’s everywhere, and plays a role in 92% of breaches, according to the Verizon Data Breach Digest. Last month, during the first installment of our phishing Whiteboard Wednesday series, we talked about the key components of an anti-phishing program, and this month we’re continuing the series by diving even deeper into this prevalent topic in security.
To be effective at combating phishing, there needs to be continuous education, monitoring, and improvement. Targeting users, one of the most susceptible attack vectors out there today, phishing attempts are rapidly evolving, meaning both security teams and users need to keep a watchful and informed eye. It’s a cyclical process, and this series is designed to help you put it all in place.
In this Whiteboard Wednesday discussion, Solutions Manager for Vulnerability Management and Offensive Security Products, Justin Buchanan, digs into one of the most important pieces of an anti-phishing program—phishing protection:
In this tutorial you’ll learn:
- How to enable your employees to identify and report potential phishing messages
- The most common discovery method of a breach
- The process for analyzing phishing messages
- How technology can add speed to the phishing detection and reporting process
As always, if there's a topic you'd like to see us cover on Whiteboard Wednesday, Tweet us @Rapid7 and use the hashtag #WBW. Thanks!