{"id":9076,"date":"2015-07-02T22:10:48","date_gmt":"2015-07-03T02:10:48","guid":{"rendered":"http:\/\/www.techwalls.com\/?p=9076"},"modified":"2015-07-02T22:16:04","modified_gmt":"2015-07-03T02:16:04","slug":"defend-business-spear-phishing-campaign","status":"publish","type":"post","link":"https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/","title":{"rendered":"How to Defend your Business from Spear Phishing Campaign"},"content":{"rendered":"<p>One of the hardest forms of cyber attacks to fend off is spear phishing campaign because it resorts to various vectors and often takes advantage of what is known about a victim&#8217;s work or private life in order to create a profile of the target before launching the attack.<!--more--><\/p>\n<p>These pieces of information could be collected from social media accounts such as Facebook or LinkedIn so that the job and\/or relationships of the targeted victim is established. Then the attacker is able to craft a seemingly legitimate campaign that reflects real situations of a potential victim&#8217;s life. This is significant because the spear phishing campaign will then have greater chances of luring the victim to click through messages that are actually deceitful.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9078\" src=\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2015\/07\/spear-phishing-campaign1.jpg\" alt=\"spear-phishing-campaign\" width=\"500\" height=\"333\" srcset=\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2015\/07\/spear-phishing-campaign1.jpg 500w, https:\/\/www.techwalls.com\/wp-content\/uploads\/2015\/07\/spear-phishing-campaign1-300x200.jpg 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>In order to effectively fight spear phishing campaigns, you must have a robust defense infrastructure, centralized cybersecurity measures, a strategic threat intelligence approach and streamlined security system.<\/p>\n<p>Cyber attackers have been using spear phishing for years because, while it is the most difficult to ward off, it is also the easiest method to gain entry into a network or any other critical infrastructures that have anti-malware installed in them.<\/p>\n<p>For Internet-based businesses, a data breach due to phishing attacks would jeopardize the reputation of a company, in addition to the loss of data, tainted customer trust and regulatory penalties.<\/p>\n<p>One sure defense mechanism to fight spear phishing is a consolidation and synchronization of how you detect and respond to this form of cyber attack. This means users must be able to view real-time threat data, security sensors always on the alert mode and end points constantly ready for whatever circumstances may arise. This guarantees a speedy response to spear phishing attempts at your enterprise.<\/p>\n<p>But the effort should not just stop there. Having a proper training on combating spear phishing attacks is just the frontliner meant to keep attackers at bay. Furthermore, it is not enough to depend only on your endpoint security software to do all the tasks of fighting the attacks. Additional sensors must be put in place to shore up your cyber defenses. This will enable the detection of possible phishing attacks even before they take place.<\/p>\n<p>Additional methods include whitelisting applications on your devices in order to prevent zero day attacks from targeting your system because it blocks unauthorized execution of codes and secures memory.<\/p>\n<p>Following these methods will help you to counter targeted spear phishing campaigns against your personal device or business.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the hardest forms of cyber attacks to fend off is spear phishing campaign because it resorts to various vectors and often takes advantage of what is known about a victim&#8217;s work or private life in order to create a profile of the target before launching the attack.<\/p>\n","protected":false},"author":89,"featured_media":9078,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1146],"tags":[23,1605,387],"class_list":{"0":"post-9076","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-guide","8":"tag-internet","9":"tag-phishing","10":"tag-security","11":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Defend your Business from Spear Phishing Campaign<\/title>\n<meta name=\"description\" content=\"One of the hardest forms of cyber attacks to fend off is spear phishing campaign because it resorts to various vectors and often takes advantage of what is known about a victim&#039;s work or private life.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest Authors\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/\",\"url\":\"https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/\",\"name\":\"How to Defend your Business from Spear Phishing Campaign\",\"isPartOf\":{\"@id\":\"https:\/\/www.techwalls.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2015\/07\/spear-phishing-campaign1.jpg\",\"datePublished\":\"2015-07-03T02:10:48+00:00\",\"dateModified\":\"2015-07-03T02:16:04+00:00\",\"author\":{\"@id\":\"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84\"},\"description\":\"One of the hardest forms of cyber attacks to fend off is spear phishing campaign because it resorts to various vectors and often takes advantage of what is known about a victim's work or private life.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/#primaryimage\",\"url\":\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2015\/07\/spear-phishing-campaign1.jpg\",\"contentUrl\":\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2015\/07\/spear-phishing-campaign1.jpg\",\"width\":500,\"height\":333},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techwalls.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tech Guide\",\"item\":\"https:\/\/www.techwalls.com\/guide\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Defend your Business from Spear Phishing Campaign\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techwalls.com\/#website\",\"url\":\"https:\/\/www.techwalls.com\/\",\"name\":\"TechWalls\",\"description\":\"Technology News | Gadget Reviews | Tutorials\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techwalls.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84\",\"name\":\"Guest Authors\",\"url\":\"https:\/\/www.techwalls.com\/author\/guestauthor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Defend your Business from Spear Phishing Campaign","description":"One of the hardest forms of cyber attacks to fend off is spear phishing campaign because it resorts to various vectors and often takes advantage of what is known about a victim's work or private life.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/","twitter_misc":{"Written by":"Guest Authors","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/","url":"https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/","name":"How to Defend your Business from Spear Phishing Campaign","isPartOf":{"@id":"https:\/\/www.techwalls.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/#primaryimage"},"image":{"@id":"https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techwalls.com\/wp-content\/uploads\/2015\/07\/spear-phishing-campaign1.jpg","datePublished":"2015-07-03T02:10:48+00:00","dateModified":"2015-07-03T02:16:04+00:00","author":{"@id":"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84"},"description":"One of the hardest forms of cyber attacks to fend off is spear phishing campaign because it resorts to various vectors and often takes advantage of what is known about a victim's work or private life.","breadcrumb":{"@id":"https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/#primaryimage","url":"https:\/\/www.techwalls.com\/wp-content\/uploads\/2015\/07\/spear-phishing-campaign1.jpg","contentUrl":"https:\/\/www.techwalls.com\/wp-content\/uploads\/2015\/07\/spear-phishing-campaign1.jpg","width":500,"height":333},{"@type":"BreadcrumbList","@id":"https:\/\/www.techwalls.com\/defend-business-spear-phishing-campaign\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techwalls.com\/"},{"@type":"ListItem","position":2,"name":"Tech Guide","item":"https:\/\/www.techwalls.com\/guide\/"},{"@type":"ListItem","position":3,"name":"How to Defend your Business from Spear Phishing Campaign"}]},{"@type":"WebSite","@id":"https:\/\/www.techwalls.com\/#website","url":"https:\/\/www.techwalls.com\/","name":"TechWalls","description":"Technology News | Gadget Reviews | Tutorials","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techwalls.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84","name":"Guest Authors","url":"https:\/\/www.techwalls.com\/author\/guestauthor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/posts\/9076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/comments?post=9076"}],"version-history":[{"count":0,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/posts\/9076\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/media\/9078"}],"wp:attachment":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/media?parent=9076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/categories?post=9076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/tags?post=9076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}