{"id":4400,"date":"2025-02-17T08:46:00","date_gmt":"2025-02-17T08:46:00","guid":{"rendered":"https:\/\/www.nebrcentre.co.uk\/?p=4400"},"modified":"2025-02-17T08:46:00","modified_gmt":"2025-02-17T08:46:00","slug":"what-you-need-to-know-about-spear-phishing","status":"publish","type":"post","link":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/what-you-need-to-know-about-spear-phishing\/","title":{"rendered":"What You Need to Know About Spear Phishing"},"content":{"rendered":"\n<p>Spear phishing emails constitute less than 0.1% of total email volume but are responsible for <a href=\"https:\/\/controld.com\/blog\/phishing-statistics-industry-trends\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">66%<\/a> of data breaches.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/spear-phishing\" target=\"_blank\" rel=\"noreferrer noopener\">Spear phishing<\/a>\u202fis a form of phishing that targets specific individuals or organisations. Instead of sending generic emails to a large group of people, attackers carefully research their victims and craft highly personalised emails to increase the likelihood of success.&nbsp;<\/p>\n\n\n\n<p>Cyber criminals use a variety of tactics to gather information about their victims, such as researching an organisation\u2019s online presence or analysing email signatures.\u202f&nbsp;<\/p>\n\n\n\n<p>With this information, they can craft unique emails that appear to come from a trusted or legitimate source, such as a colleague or company with which the victim works.\u202f&nbsp;<\/p>\n\n\n\n<p>These emails often contain a call to action, such as clicking on a link,downloading an attachment, by visiting a malicious URL or by opening an attachment this presents an opportunity for the hackers to infect your computer with malware. Furthermore, through spear phishing hackers often try to trick recipients to divulging login credentials or making fraudulent payments &nbsp;<\/p>\n\n\n\n<p><strong>To protect yourself from spear phishing, be wary of unsolicited emails, verify the sender\u2019s identity, and implement Multi-Factor Authentication (MFA) onto all accounts.\u202f<\/strong>&nbsp;<\/p>\n\n\n\n<p><strong>You can also educate employees on identifying and avoiding spear phishing attacks. Conduct\u202f<\/strong><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/security-awareness-training\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>regular training sessions<\/strong><\/a><strong>\u202fand simulate spare phishing attacks to test their knowledge.<\/strong>&nbsp;<\/p>\n\n\n\n<p><strong>For further guidance on how to stay safe against spear phishing attacks, please contact\u202f<\/strong><a href=\"mailto:enquiries@nebrcentre.co.uk\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>enquiries@nebrcentre.co.uk<\/strong><\/a><strong>.<\/strong>&nbsp;<\/p>\n\n\n\n<p>Sign up for our\u202f<a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/core-membership-sign-up\/\" target=\"_blank\" rel=\"noreferrer noopener\">free core membership<\/a>\u202fto stay up to date with the latest cyber security news and gain access to a wealth of handy online\u202f<a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/resources\/\" target=\"_blank\" rel=\"noreferrer noopener\">resources<\/a>.&nbsp;<\/p>\n\n\n\n<p><strong>The NEBRC is a non-profit organisation that seeks to\u202f<\/strong><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/services\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>educate<\/strong><\/a><strong>,\u202f<\/strong><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/news\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>inform<\/strong><\/a><strong>, and\u202f<\/strong><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/support\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>support<\/strong><\/a><strong>\u202fbusinesses across the UK on how to stay safe online through robust cyber security practices<\/strong><strong>.<\/strong>&nbsp;<\/p>\n\n\n\n<p>Sign up for our&nbsp;<a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/core-membership-sign-up\/\">free core membership<\/a>&nbsp;to stay up to date with the latest cyber security news and gain access to a wealth of handy online&nbsp;<a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/resources\/\">resources<\/a>.<\/p>\n\n\n\n<p><strong>The NEBRC is a non-profit organisation that seeks to&nbsp;<\/strong><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/services\/\"><strong>educate<\/strong><\/a><strong>,&nbsp;<\/strong><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/news\/\"><strong>inform<\/strong><\/a><strong>, and&nbsp;<\/strong><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/support\/\"><strong>support<\/strong><\/a><strong>&nbsp;businesses across the UK on how to stay safe online through robust cyber security practices.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Spear phishing emails constitute less than 0.1% of total email volume but are responsible for 66% of data breaches.&nbsp; Spear phishing\u202fis a form of phishing&#8230;<\/p>\n","protected":false},"author":1,"featured_media":4401,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[],"class_list":["post-4400","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"_links":{"self":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts\/4400","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/comments?post=4400"}],"version-history":[{"count":0,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts\/4400\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/media?parent=4400"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/categories?post=4400"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/tags?post=4400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}