Phishing techniques change at the same rate that security and protection technologies do – it’s a constant cat and mouse game.
What is the HTML targeted phishing campaign?
Microsoft have spent a year investigating a new invoice-themed XLS.HTML phishing campaign, a very targeted, evasive and evolving attack.
In this type of attack, cyber criminals will divide the HTML attachment into segments. They will then encode them with techniques, such as Morse code to hide the malicious segments.
The HTML file may appear safe at the code level which may lead to it being undetected by standard security solutions.
What do cyber criminals want from the phishing campaign?
Cyber criminals are looking to gather information to help them in future infiltration attempts, harvesting usernames, passwords and IP addresses. They gain their targets email address, company logo and other details to help with their convincing social engineering attacks.
When your organisation’s data gets into the wrong hands it can lead to large fines, negative reputation and business closure, which is why cyber security, data protection and data security should be high on your business agenda.
How can you secure your organisation from cyber attacks?
In order to help protect your organisation from cyber crime, you must implement a multi-layered approach:
Email Security for Microsoft 365
Detect threats that traditional email security solutions would miss with high tech Barracuda Sentinel technology.
Cyber Essentials
Get Cyber Essentials Plus accredited to demonstrate your commitment to cyber security. Complete I.T. can guide you through the process to help ensure your organisation is protected against the most common cyber threats.
Managed Firewall
Ensure suspicious behaviour is flagged and immediate action is taken with a managed firewall.
End User Education
Education is key to protecting your organisation’s systems and your team are your best defence against cyber crime.
Endpoint Security and Compliance
Protect and monitor your devices 24/7 to ensure malicious activity is detected before malware is deployed.
Adding multiple layers of protection will greatly reduce the risk of cyber threats from reaching your systems and team.
- Get in touch today to discuss cyber security
- Read our latest cyber security case study with 4 Earth Intelligence