1. Purpose
The purpose of this training is to educate ManoByte employees on the risks of spam, phishing, malware, and other email-based attacks. By understanding how these attacks work and knowing how to respond, employees can protect themselves and the company from cyber threats.
2. Scope
This training applies to all employees, contractors, and vendors who use ManoByte’s email systems. It is essential for everyone to understand how to recognize and prevent email attacks to maintain the security of ManoByte’s systems and data.
3. Types of Email Attacks
3.1 Spam
- Definition: Unsolicited bulk emails often sent for advertising purposes, though sometimes they are used to deliver malware.
- Key Characteristics:
- Unfamiliar senders.
- Messages that sound too good to be true (e.g., "You’ve won a prize!").
- Unsolicited attachments or links.
3.2 Phishing
- Definition: Emails that attempt to trick recipients into providing sensitive information (e.g., passwords, credit card numbers) by pretending to be from legitimate organizations.
- Key Characteristics:
- Urgent calls to action (e.g., "Your account will be suspended unless you act now").
- Emails that appear to be from a trusted source (e.g., a bank or popular service) but have suspicious URLs or sender addresses.
- Requests for personal or financial information.
3.3 Spear Phishing
- Definition: A targeted form of phishing, where attackers tailor emails to specific individuals, often by pretending to be a known colleague or superior.
- Key Characteristics:
- Familiar-sounding requests from known contacts.
- Subtle requests for sensitive data or financial transactions.
- Emails that seem slightly out of context or unexpected from the sender.
3.4 Malware
- Definition: Malicious software delivered via email attachments or links that can infect a computer and steal or damage data.
- Key Characteristics:
- Unsolicited attachments (e.g., PDFs, ZIP files).
- Links to unfamiliar or suspicious websites.
- Unusual behavior after clicking on an attachment or link (e.g., slow performance, strange pop-ups).
4. How to Recognize Suspicious Emails
- Check the Sender: Always verify the email address. Attackers often use email addresses that closely mimic legitimate ones (e.g., using a lowercase "L" instead of an "I").
- Watch for Poor Grammar or Formatting: Legitimate organizations typically use professional language. Typos, broken links, or unusual formatting can be a red flag.
- Look for Mismatched URLs: Hover over links to see where they lead. If the URL doesn’t match the company’s website or looks suspicious, don’t click.
- Beware of Unsolicited Attachments: Be cautious of unexpected attachments, especially from unknown senders.
- Urgent or Suspicious Requests: If an email asks for sensitive information, verification, or urgent actions (like transferring funds), it could be a phishing attempt.
5. How to Respond to Suspicious Emails
- Don’t Click Links or Open Attachments: If the email looks suspicious, do not click any links or download any attachments.
- Verify with the Sender: If the email seems to be from someone you know, contact them through a different method (phone or company chat) to confirm the request.
- Report Phishing or Spam: Forward suspicious emails to the IT department or designated security contact and delete the message from your inbox.
- Use Caution with External Emails: ManoByte emails will include a warning label for external senders. Be cautious when interacting with emails from outside the organization.
6. Preventive Measures
- Use Multi-Factor Authentication (MFA): MFA adds an extra layer of security to your email account, making it harder for attackers to gain access.
- Keep Software Updated: Ensure your operating system, antivirus software, and email clients are up to date to protect against known vulnerabilities.
- Enable Email Filtering: Email filtering can block most spam and phishing attempts before they reach your inbox. Make sure email filters are enabled and correctly configured.
- Password Security: Use strong, unique passwords for your email account and change them regularly. Never reuse passwords across different platforms.
7. Reporting and Escalation
- Reporting Suspicious Activity: If you encounter a suspicious email, report it to the IT department immediately. You can forward the email with a brief description of why you suspect it to be malicious.
- Incident Response: If you accidentally clicked a suspicious link or opened an attachment, contact IT immediately for assistance. Early detection and response can minimize potential damage.
8. Conclusion
Email attacks, including spam, phishing, and malware, are major security threats. By staying informed and vigilant, you can help protect yourself and ManoByte from cyberattacks. Always be cautious, verify suspicious requests, and report any email attacks immediately.