Skip to content

DON'T FEED THE PHISH

90% of all cyberattacks begin with phishing.

Frank fed the phish. 

And it put his company at risk. 

We can all envision "Frank" in our heads right now. Happy to be at work, well-meaning, but maybe a little naïve. Unfortunately for you, Frank could also create a potential security breach.

Follow along with Frank's shenanigans to see how he unintentionally puts himself and coworker, Joan at risk. 

Frank didn't take his time to research this email - and it will cost him.

DON'T FEED THE PHISH

90% of all cyberattacks begin with phishing.

Frank fed the phish. 

And it put his company at risk. 

We can all envision "Frank" in our heads right now. Happy to be at work, well-meaning, but maybe a little naïve. Unfortunately for you, Frank could also create a potential security breach.

Follow along with Frank's shenanigans to see how he unintentionally puts himself and coworker, Joan at risk. 

Phishing_Bait_2

Don’t take the bait on phishing attempts.

  • Over 30 percent of successful phishing emails were from a fake HR account versus any other type of suspicious email.

  • The two most common successful phishing topics are HR and voicemail notifications.

  • Phishing emails tend to create panic and urgency so you act without thinking.

Frank won the office giveaway! Or did he?

Frank explores the dangers of fake HR emails. Always double-check the sender of an enticing email, such as winning a giveaway you’ve never heard about.

Frank won the office gift card giveaway! Right?
Prevent_Phising

How to prevent a phishing attack:

  • Be wary of impersonation.

  • Always call before you click to double check the legitimacy of the request.

  • Keep all software and security tools up to date.

  • Use modern email protection.

  • Provide employees with education and training on phishing.

Did Frank email his coworker Bill, or a fishy hacker?

 

Discover yet another tactic criminals use to try and gain access to your important data.

Did Frank send his personal information to Bill, or someone he shouldn't trust?

What can Proton do for you?

Phishing failure has

dropped 30%

for Proton users.

Our clients receive

24/7/365

monitoring.

 

74% of organizations

don't get their data back after paying a ransom.

Work with the best to protect from the worst.

Proton provides a full IT department, with remote and onsite support, and Network and Security Operations Centers tailored specifically to automotive retail. Our dealership specific experience gives us a unique insight to help ensure your dealership has the strongest and most up-to-date protections.

Fill out the form to get started with a free 20-minute consultation so we can better understand your current IT and cyber challenges and start building a plan for protecting your network.

Proton_Shield