ERP Replacement: The Good, the Bad, and the Ugly
The thought of implementing a new enterprise resources planning (ERP) system can be overwhelming, especially when presented with so many enterprise software solutions to choose...
SDI’s cybersecurity team offers user-friendly advice on managing common cyber threats.
Most business professionals are aware that malware and computer viruses can easily spread to unsuspecting users via e-mail. As threats become more sophisticated, what may look like a valid e-mail might contain a link to a website that can trick the recipient into giving up sensitive information or a disguised attachment that delivers a malicious payload.
To help identify questionable emails, the SDI team points out the four indicators below that are typical red flags associated with malicious emails:
Example: In the screen shot below, the e-mail appears genuine. Notice that the grammar is a bit off and there is no signature on the e-mail. Both should raise red flags.
While hovering over the link in the document (REVIEW DOCUMENT) notice that it sends the recipient off to a strange website:
Any links that look suspicious should be investigated before linking through.
It is important to note that suspicious emails should not be forwarded – which includes to your organization’s IT support team! Talk to your internal IT contact to become familiar with your organization’s procedures for handling suspicious emails.
SDI offers comprehensive cybersecurity services – from initial vulnerability assessments through 24X7 cyber incident monitoring and response programs. The SDI cyber team develops enterprise cyber policies and procedures, provides vulnerability remediation services, and conducts employee cyber training to achieve our clients’ target cybersecurity posture compliance.
Contact SDI for more information on how to protect your organization, starting with an initial enterprise vulnerability assessment.