RESOURCES Security Awareness

The best ways to build cyber security resilience in your organisation is to have strong systems in place and staff that are well-informed of security risks and follow best-practices.

Check out below guidance and video trainings to help you detect and respond to phishing attacks and other cybersecurity threats.

Security awareness

Phishing Attacks

If you think you’ve been sent a phishing email, here’s what to do next.

  1. If you haven’t done anything with the email, delete it.
  2. If you gave out some personal or financial details:
    • contact us and tell us what happened
    • change the passwords for any online accounts you think might be at risk
    • enable Multi-Factor Authentication for any online accounts if available
  3. Review CERT NZ recommendations, keep calm and read on…
Example of Netflix phishing attempt

How to recognise phishing attempts

Although you can’t prevent a phishing attack, there are things you can do to make sure you recognise one:

  • Know what to look for in a phishing email. You might notice that:
    • you don’t recognise the sender
    • the sender name doesn’t sound quite right
    • you don’t recognise the name of the company
    • the company logo doesn’t look like it should
    • the email refers to you in a generic or odd way — for example, ‘Dear You…’
    • the email contains bad grammar or spelling
    • if you hover over a link in the email with your mouse, the address that you see doesn’t match the place it’s saying it’ll take you.
  • Don’t click on web links sent by someone you don’t know, or that seem out of character for someone you do know. If you’re not sure about something, contact the person you think might have sent it to check first.
  • Use bookmarks or favourites to access websites rather than links in emails.
  • Check to see how the companies you deal with — like your bank — will contact you, so you’re more likely to recognise what’s a legitimate request and what isn’t.
  • If you have your own business, make sure you keep your support contracts (with your antivirus provider or your firewall provider, for example) up to date.
  • Follow us on Twitter and LinkedIn and look out for our real-life phishing examples in our Phish of the Day series.

Remember — if you don’t click on any links or attachments in a phishing email, your system is safe.

Password Training

Best practices for better passwords

Not sure where to start? Let us help.

When it comes to cyber security breaches – it’s not a matter of if, it’s a matter of when. Prioritise your organisation’s information security today.

Contact us to get started.