Cybersecurity

What you should do after a spear phishing attack

By Veriato Team

We all know information security is complicated and multi-faceted. You have plans to defend you from countless types of attacks and threats, but the risk is still there. Spear phishing is a common threat and your organization should have a plan of how to respond in the event of this type of attack.

What is spear phishing?

Spear phishing is an individually targeted email attack with the intent of gaining access to personal or sensitive information. Often, the spear phisher will send an email from a seemingly trusted website or from someone you think is in your contacts list. For example, a popular spear phishing scheme involves posing as a bank and asking for your bank account information for verification, or a coworker asking for access to certain online documents.

Immediate steps after an attack

Spear phishing has become extremely sophisticated, and even educated employees can be susceptible. If you realize you’ve been attacked, report the incident immediately. Your IT team will be able to isolate the damage and help you protect your identity. Additionally, they will be able to spread the word so other employees don’t fall for the same scheme.

You should immediately increase your online personal security. Change your passwords to any accounts involved in the attack and enable multifactor authentication – for example password and security code via text. Call any companies involved, like your bank or credit card company if the personal information stolen was financial.

From an IT perspective, you should immediately blacklist the sender(s) to stop them from targeting your organization again from the same address. You should also search systems for unauthorized or suspicious traffic to make sure the spear phisher didn’t steal any network user identifications and is now able to access your organization’s data.

Educate and move forward

Spear phishing is very common and the likelihood it happens to someone in your organization is unfortunately high. If there is an attack, use the experience as an example to educate your employees. Although attacks are increasingly sophisticated, educating your employees on spear phishing and how to detect attacks can still go a long way on protecting your organization.

Remind your employees that they should always read an email that’s asking them to do something involving personal information two or three times to make sure they have a grasp on the content. And, if it seems even remotely suspicious, they should call the institution the sender is claiming to represent to confirm the email request. While proper education won’t protect from every spear phishing attack, it can go a long way in keeping sensitive information confidential.

Spear phishing is a real concern to both individuals and organizations. If you are targeted, follow these steps to minimize damage and protect both your employee’s and your company’s information.

Insider Risk – How Prepared Are You?

Insider Risk – How Prepared Are You?

Not every company is equally prepared to deal with insider risk. This report outlines the four stages of insider risk maturity and explores how to improve your insider risk preparedness.

About the author

Veriato Team
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Quis ipsum suspendisse ultrices gravida.

Insider Risk & Employee Monitoring Resources

Smart Year-End IT Investments- A Trifecta for ROI

Smart Year-End IT Investments- A Trifecta for ROI

Drive Productivity, Reduce Insider Risk, Enforce Compliance As the year wraps up, many IT, security, compliance, and HR teams have unspent budgets that won't roll over. Rather than scrambling for last-minute, low-value purchases, why not make smart, strategic...

Is IAM, SIEM, and DLP Enough to Combat Insider Risk?

Is IAM, SIEM, and DLP Enough to Combat Insider Risk?

Key Takeaways: Closing the Gaps in Traditional Security Tools: IAM, SIEM, and DLP are vital but insufficient in addressing insider risks. They focus on access control, event logs, and data protection without understanding the behavioral context that signals insider...