Back to Blog

Cybersecurity Email Attacks Get Victims to Click Links

Today, hackers and crackers aren't always as technically clever as we think they are. Around 99% of email attacks performed today aren't using a cunning piece of computer code to take control of their victim's machines. Rather, they rely on a different type of cunning - social engineering.Social engineering techniques are being used to get email attacks, victims, to willingly click on malicious links. This kind of attack, known as phishing, relies on the victim believing that the email comes from a trusted source. They might impersonate a colleague or a boss, or even a trusted cloud services provider. The user sees the email (which has been carefully crafted to make it look like it comes from the source), and they then willingly click on the link, download the document, complete some other action.

Fighting Phishing

Users are the last line of defense when it comes to phishing attacks. While many phishing attacks are quite well-done these days, they aren't perfect. A lot of attacks rely on a sense of urgency. If you get a terse email from someone asking you to do something, think for a moment. Does that email 'sound like' them? Do they normally email you documents, and if they do, is that filename something they would usually use?If you're in any doubt at all, contact the sender another way and ask them if the email is legitimate. You can also contact our professionals for help with cybersecurity.Remember that the big cloud services providers don't send unexpected links to their customers, and they won't ask you to log in after you've clicked a link in an email. Again, if you're unsure, go directly to the provider's website by typing the address into your browser's address bar, and log in from there. If the email was about anything important, you'll have a notification in your account as well.

Share on social media: 

More from the Blog

Introducing Hook Heroes!

‍The Hook Security Team is excited to announce that you can now become a Hook Hero. Simply put, you can now get rewarded for sharing the love for and referring your friends to Hook Security!

Read Story

How to Set up a Training Campaign

In this video, we will review how to set up a training campaign. From picking out a template to sending it out in the Campaign Wizard, you’ll have the tools you need! ‍

Read Story

Why Security Awareness Doesn't Work Without Executive Buy-in

One of the most common challenges that organizations face when trying to implement security awareness training is getting executive buy-in. without the support of executives, security awareness programs can quickly become ineffective and compliance-focused rather than user-centric. In this blog post, we will examine some of the reasons why security awareness training requires executive buy-in and provide tips on how to get your executives on board.

Read Story

Never miss a post.

Enter your email below to be added to our blog newsletter and stay informed, educated, and entertained!
We will never share your email address with third parties.