{"id":6212,"date":"2021-09-02T09:05:16","date_gmt":"2021-09-02T07:05:16","guid":{"rendered":"https:\/\/immune.institute\/?p=6212"},"modified":"2021-09-02T09:05:16","modified_gmt":"2021-09-02T07:05:16","slug":"spear-phising-que-es-y-como-evitarlo","status":"publish","type":"post","link":"https:\/\/immune.institute\/en\/blog\/spear-phising-que-es-y-como-evitarlo\/","title":{"rendered":"Spear phishing: What is it and how to avoid it?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">We never tire of saying it: in addition to its incredible advantages, the Internet exposes users to multiple dangers. Millions of cyber-attacks take place every day, some of them ad hoc. In other words, <\/span><b>personalised cyber attacks<\/b><span style=\"font-weight: 400;\"> and carried out by the <\/span><a href=\"https:\/\/immune.institute\/en\/hacking-etico-que-es-y-que-debo-aprender-para-ello\/\"><span style=\"font-weight: 400;\">hackers<\/span><\/a><span style=\"font-weight: 400;\"> in an intentional way.<\/span><\/p>\n<blockquote>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Cybercriminals pose as customers, partners, banks and even family members of victims.<\/span><\/p>\n<\/blockquote>\n<p><span style=\"font-weight: 400;\">In fact, the actions of these hackers include spear phishing, which companies and individuals should be on the alert for. <\/span><b>In this article we tell you what spear phishing is and how to avoid it.<\/b><\/p>\n<h2><span style=\"font-weight: 400;\">Spear phishing: definition<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The <\/span><b>spear phishing or identity theft<\/b><span style=\"font-weight: 400;\"> is a type of cyber-scam that usually occurs via e-mail. Individuals, organisations or companies are its victims.<\/span><\/p>\n<p><b>The aim of this attack is to steal data for malicious purposes.<\/b><span style=\"font-weight: 400;\">In addition, hackers can install malware on the victim's computer for further espionage. This is a real danger, both on a personal and institutional level.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The modus operandi is usually the same: <\/span><b>an email<\/b><span style=\"font-weight: 400;\">The victim is then directed to a fake website containing malware. However, with the advent of the pandemic and the widespread use of the <\/span><b>QR codes<\/b><span style=\"font-weight: 400;\">cybercriminals have discovered this other way to capture victims. In the end, the result is the same: <\/span><b>reach a web page with malware and be able to extract information from the device, be it a PC or a smartphone.<\/b><\/p>\n<h3><span style=\"font-weight: 400;\">What is the difference between phishing and spear phishing?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">First of all, spear phishing is a type of personalised cyber phishing. <\/span><b>And the fact is that<\/b> <b>phishing is a type of random cyber-attack.<\/b><span style=\"font-weight: 400;\">. It is carried out on the basis of a mass mailing.<\/span><\/p>\n<p><b>However, spear phishing is a much more elaborate cyber attack, as it is intentional.<\/b><span style=\"font-weight: 400;\"> Thanks to this technique, the cybercriminal spies on the victim for weeks or months and learns about the victim's online habits.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Passwords, bank codes, images, confidential information... business data, which are totally exposed to this type of cyber-attack.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">4 tips to protect your business from spear phishing attacks<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Here's how to protect your company's data from a possible spear phishing attack.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">1. Keep software up to date<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">First of all, <\/span><b>the company's computers need to be up-to-date and secure<\/b><span style=\"font-weight: 400;\">. That is, within these devices, to have an effective antivirus, which protects the computer from malware and anti-spam software.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Having the latest patches is very important to prevent hacker attacks.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">2. Avoid suspicious links and files.<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Although it may seem obvious, not everyone is aware that <\/span><b>clicking on certain links or downloading certain files can be harmful.<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thus, we would like to appeal to common sense and reiterate that, in case of any doubt about the suspicious origin of a file in a message, <\/span><b>IT security professionals should be consulted.<\/b><\/p>\n<h3><span style=\"font-weight: 400;\">3. Rely on cyber-security experts<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">In addition to establishing habits, such as those mentioned above, among the employees of a company, it is essential to <\/span><b>leave IT security in the hands of professionals<\/b><span style=\"font-weight: 400;\">. The <\/span><a href=\"https:\/\/immune.institute\/en\/que-se-necesita-para-trabajar-en-ciberseguridad\/\"><span style=\"font-weight: 400;\">cybersecurity experts<\/span><\/a><span style=\"font-weight: 400;\"> are in great demand in all types of organisations as, thanks to their experience and studies, they establish the most secure and reliable cyber protection strategy.<\/span><\/p>\n<p><b>Incorporate new IT security policies and practices<\/b><span style=\"font-weight: 400;\">The use of a secure server, as well as educating employees, are necessary measures to protect your company's data from cyber criminals.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">4. Specialised training<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Finally, to mitigate a spear phishing attack, <\/span><b>it is essential to raise awareness of its importance among workers.<\/b><span style=\"font-weight: 400;\">. For this purpose, a <\/span><a href=\"https:\/\/immune.institute\/en\/empresas\/\"><span style=\"font-weight: 400;\">specialised training for companies<\/span><\/a><span style=\"font-weight: 400;\"> cybersecurity is becoming essential.<\/span><\/p>\n<p><b>One click by an employee can have serious consequences for an entire company.<\/b><span style=\"font-weight: 400;\"> With data theft, hackers reveal sensitive information for the institution (customers, bank details, content, etc.), which can lead to huge losses for the institution.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Discover the best training to prevent cyber-attacks<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Providing specific cyber-security training is therefore a priority. <\/span><b>At IMMUNE we carry out tailor-made programmes, which we adapt to the needs of each organisation.<\/b><span style=\"font-weight: 400;\">. Contact us and we will provide you with what you are looking for.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also, if you are looking for <\/span><b>become a computer security expert<\/b><span style=\"font-weight: 400;\"> or you want to learn more, we recommend our <a href=\"https:\/\/immune.institute\/en\/programas\/bootcamp-en-ciberseguridad\/\">Cybersecurity Bootcamp<\/a> and the <\/span><a href=\"https:\/\/immune.institute\/en\/programas\/master-online-de-ciberseguridad\/\"><span style=\"font-weight: 400;\">Master's Degree in Cybersecurity.<\/span><\/a><\/p>\n\n\n<p class=\"wp-block-paragraph\"><\/p>","protected":false},"excerpt":{"rendered":"<p>No nos cansamos de decirlo: adem\u00e1s de sus incre\u00edbles ventajas, Internet expone a los usuarios ante m\u00faltiples peligros. Cada d\u00eda se producen millones de ciberataques y, algunos de ellos, son realizados ad hoc. Es decir, ataques cibern\u00e9ticos personalizados y llevados a cabo por los hackers de una forma intencionada. Los ciberdelincuentes se hacen pasar por [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8100,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-6212","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/6212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/comments?post=6212"}],"version-history":[{"count":0,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/6212\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media\/8100"}],"wp:attachment":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media?parent=6212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/categories?post=6212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/tags?post=6212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}