Countermeasures against Phishing
UNDERSTANDING PHISHING
Phishing is defined as a cyberattack where
attackers impersonate trusted entities to steal
sensitive information.
There are many forms of phishing: Email
phishing, Spear phishing, Smishing(SMS
phishing), Vishing(Voice phishing), and
Pharming, all of which pose a significant threat
to personal as well as organisational security.
THE IMPACT OF PHISHING
●   Financial loss: Fraudulent transactions and
    recovery costs.
●   Data Breaches: Exposure of sensitive
    information related to a person, client, or a
    company.
●   Reputational Damage: Loss of trust from
    clients and stakeholders.
●   Potential identity theft: Stealing a person’s
    personal information to commit fraud or
    other malicious activities.
VICTIMS OF PHISHING
1.   Individuals : A study found that older women were the most susceptible to
     phishing, while young user’s susceptibility declined over the years.
2.   Employees : Top executives like CEO’s and CFO’s are often targeted
     because they have access to sensitive information and the authority to sign
     off on projects and financial transfers.
 Over 48% of emails sent in 2022 were spam. Over a fifth of phishing emails
originate from Russia. Millennials and Gen-Z internet users are most likely to
fall victim to phishing attacks.
RECOGNISING PHISHING ATTEMPTS
●   Suspicious sender addresses and email domains.
●   Unexpected or urgent requests for sensitive
    information.
●   Links that don’t match official URLs.
●   Businesses do not send messages without checking
    spelling and grammar.
        EMPOWERING THE WORKFORCE
●   Regular training sessions on cybersecurity and
    phishing awareness.
●   Encouraging a culture of caution and reporting.
●   Simulated phishing campaigns to test and improve
    responses.
●   Establish clear channels for employees to verify
    emails supposedly from departments such as HR,
    Finance, and IT.
MULTI-FACTOR AUTHENTICATION
             ●   Implement MFA for accessing company accounts and
                 systems.
             ●   Combines passwords with OTPs, biometrics, or
                 security keys.
             ●   These are several enterprise-grade MFA solutions:
                 PingOne MFA, Cisco Duo, IBM Security Verify.
TECHNOLOGY AND TOOLS
              ●   Deploy anti-phishing software and firewalls.
              ●   Use endpoint detection and response (EDR)
                  systems.
              ●   Enable email and browser filtering tools.
              ●   DNS filter checks a URL in an email link against
                  a block list of URLs to block access to malicious
                  landing pages.
    SECURE EMAIL PRACTICES
●   Use encrypted email services.
●   Implement spam and phishing filters.
●   Avoid clicking on links or downloading
    attachments from unknown sources.
    REPORTING PHISHING ATTEMPTS
●    Centralized system for employees to report
     suspicious emails.
●    Collaborate with cybersecurity agencies and
     industry groups.
●    Share intelligence to prevent widespread attacks.
                     CONCLUSION
Phishing poses a significant threat to organizations and people, but it is
a challenge that can be effectively addressed with the right measures.
Using technology such as multi-factor authentication, antivirus
software, and regularly updating devices enhances personal security.
Organisations implementing email filters, incident response plans, and
employee training strengthens overall resilience.
Awareness is equally important. Staying informed about phishing
tactics and adopting a proactive and layered approach, can minimize the
risk of phishing and safeguard everyone’s digital lives.