0% found this document useful (0 votes)
74 views4 pages

Stop Phishing: Essential Email Security Guide

The 'STOP PHISHING Handbook' provides guidance on preventing phishing attempts targeting the company Lupovis. Key recommendations include changing passwords, checking email forwarding, enabling multi-factor authentication, and investigating unusual email activity. The document also suggests implementing email authentication methods like DKIM and DMARC for enhanced security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views4 pages

Stop Phishing: Essential Email Security Guide

The 'STOP PHISHING Handbook' provides guidance on preventing phishing attempts targeting the company Lupovis. Key recommendations include changing passwords, checking email forwarding, enabling multi-factor authentication, and investigating unusual email activity. The document also suggests implementing email authentication methods like DKIM and DMARC for enhanced security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

STOP

PHISHING
Handbook
STOP
PHISHING
Intro
Guess what? Some clever clogs have been trying to play dress-up, sending
emails from your company to obtain information about Lupovis.

These are sneaky little phishing attempts trying to snag our personal details.

But, we'got your back!

We've got our Sherlock Holmes hat on and we're hunting down these naughty
impersonators. Meanwhile, we'd love to share how you can step up your game to
stop these fishy emails from swimming out again.

The easy steps


So, we'd love to help you, and we made a quick guide for you.

Password Changes: If the account appears to have been compromised,


01 immediate password changes should be enforced.

02 Check Forwarding: Adversaries often use forwarding functions, just in case you
change your password. Make sure that all email forwarding are disabled.

Employ Multi-factor Authentication (MFA): Enable MFA for all email accounts
03 makes it more difficult for attackers to gain access to email accounts, even if
they manage to acquire the passwords.

02
STOP
PHISHING
The Intermediary

Email System Investigation: Review the organization's sent folder and mail
01 server logs for any unusual emails that might have been sent out to clients.

02 Investigate Unusual Logins: Check the account for any unusual logins or activity.
This includes checking for logins from unfamiliar locations or at odd hours.

Audit User Account Access: Review who has access to the email system and
03 whether their access level is appropriate. Any unnecessary access should be
immediately revoked.

04 Check for Malware: Perform a malware scan on the system to ensure there's no
malicious software causing these emails to be sent.

The harder ones

01 Enable DKIM: DomainKeys Identified Mail (DKIM) is an email authentication


method that is designed to detect forged sender addresses in emails, a
technique often used in phishing and email spam. It allows the receiving mail
server to check if the email was actually sent by the domain it claims to have
been sent from and if the content was tampered with during transit.

Enable DMARC: Domain-based Message Authentication, Reporting &


02 Conformance (DMARC) is another protocol that uses both SPF and DKIM to
determine the authenticity of an email message.

Finally, if you're feeling a bit lost at sea with all this talk of phishing and email
security, remember we're here to throw you a lifebuoy!

Don't hesitate to reach out to us with any questions or concerns you


may have. If you're more comfortable speaking with someone local to
you, that's great too! Consider contacting a cybersecurity firm in
your area who can provide a helping hand. After all, navigating the
stormy waters of cybersecurity can be a team effort!

03
GOOD
LUCK
[Link]

You might also like