3 steps to identify a potential phishing email

CSO was recently targeted by a phishing campaign. In this how-to guide, Staff Writer Steve Ragan breaks down the elements of the email that were red flags to the team, and offers information to keep users in your organization from clicking, too, in the event that you're targeted by a phishing attack

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.

As explained in a previous story, the editorial team at CSO was targeted by a phishing campaign recently. If it had been successful, the person(s) behind it would have tricked us into installing the Zeus Trojan, a nasty bit of financial malware.

Lucky for us however, our user awareness training took hold, and we used some basic logic in order to spot the scam. So in addition to a visual breakdown, which you can see here, this article will address some basics when it comes to spotting and dealing with a phishing attack.

[Related slideshow: How to spot a phishing email]

To continue reading this article register now

Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.