window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-112700210-1');

How would your firm handle a phishing attack?

2019-01-24T16:39:22+01:00August 10th, 2018|

The BBC published an article on Tuesday about the aftermath of a successful Phishing attack where the user had granted the malware access by logging into a fake login. The article then details the process inside the company of handling a breach and the procedure they need to follow. However, this team clearly aren’t as prepared as they should be.

At TecSec, we believe in being pro-active which is why we advise you to read our article on “How a Phishing attack progresses” and the red flags to help you identify the phishing email for what it is, a scam.

Under GDPR a phishing attack now must be reported to the ICO as a breach, if the user clicks the link or downloads a file. Depending on the technical and business measures in place, the business is at risk of being fined.

About the Author:

This website uses cookies and third party services. Settings Accept

Tracking Cookies title

More content

Third Party Embeds Title

Some content