As a relatively new account executive at Corus360, I am learning more than I ever expected to about everything ‘techy’ – from networking to storage to servers, you name it! While drinking from the IT firehose, I find myself drawn to certain topics. Some of them are industry-relevant and current, while others are topics that I personally find interesting. One of the topics that has piqued my interest the most by checking both boxes is cybersecurity. As of late, email security threats have been one of the most talked about topics on LinkedIn. Given the current state of the world, people are more emotionally vulnerable and distracted due to stress, which has made email threats more prevalent than usual. And that brings us to the point of this blog: Defining the different types of email attacks.

  • Phishing: Typically speaking, phishing seeks to attack a wide scope of people with the hopes of catching a few people who take the bait. A good phishing email attempts to come across as legitimate and directs the receiver to login to a website, click a link, or perform a specific action that will give the attacker access to the victim’s data. Then, the attacker requires the victim to enter in either personal or company financial information in order to avoid the threat of potential damage.
  • Spear Phishing: Unlike ordinary phishing, spear phishing targets a small group of victims to achieve a higher click/conversion rate. To do this, the attacker gets ahold of private information by researching a person or company’s background on the internet and then uses that information to convince the victim to perform the desired task(s). This can be a wake-up call to some of us who have seemingly harmless personal information floating out there!
  • Whaling: Simply put, whaling is the same as spear phishing but it specifically targets senior business executives. Attackers aim to fool the executive into handing over sensitive information or large sums of money.
  • Social Engineering: Instead of relying on people’s virtual vulnerabilities, social engineering relies on phone calls and other person-to-person techniques. Social engineering involves psychologically manipulating people without them knowing it and getting them to give the attacker confidential information. Criminal Minds vibes, for sure!

All in all, cybersecurity is a huge topic in tech for a good reason. Everyone is vulnerable, and protecting your company’s data and intellectual property is vital to keeping your business on its feet and thriving. Taking the time to understand what cyberthreats look like and how to respond to them is more crucial than ever.