{"id":55256,"date":"2021-10-12T14:18:33","date_gmt":"2021-10-12T18:18:33","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=55256"},"modified":"2024-02-20T18:45:06","modified_gmt":"2024-02-20T23:45:06","slug":"many-masks-phisher","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/many-masks-phisher","title":{"rendered":"The Many Masks of the Phisher"},"content":{"rendered":"\n
It\u2019s Cybersecurity Awareness Month! In honor of the theme \u2014 Do Your Part. #BeCyberSmart \u2014 we\u2019re doing our part by educating IT teams and organizations on protecting themselves. Throughout October, the JumpCloud blog will focus on top cybersecurity issues, from IT admin best practices to CISO responsibilities. Tune back in throughout the month for new cybersecurity content or check out our archive of existing security articles<\/a> for cybersecurity insights written specifically for the IT professional.<\/em><\/p>\n\n\n\n <\/p>\n\n\n\n Unlike many other attack methods, phishing preys on human nature. Further, its low-tech nature is one of the reasons it\u2019s still so popular. It\u2019s easy to implement and casts a wide net that doesn\u2019t often come up empty. <\/p>\n\n\n\n Because even one user who falls victim can let in malware that infects the entire infrastructure, everyone in your organization needs to be able to detect and appropriately respond to phishing. <\/p>\n\n\n\n In keeping with this year\u2019s Cybersecurity Awareness Month theme, this article will help IT admins prepare users to recognize and respond correctly to phishing attacks.<\/p>\n\n\n\n Because phishing is all about hackers infiltrating your organization by pretending to be someone a user trusts, this article will cover some of a phisher\u2019s most common disguises. It will also cover how to best respond to a suspected attack, and how to prevent attacks from taking hold. <\/p>\n\n\n\n Note<\/em><\/strong>: If you don\u2019t already have a phishing awareness campaign in place, you can start by sharing these tips with your employees so they know what to look for and what to do if they suspect phishing. <\/em><\/p>\n\n\n\nPopular Types of Phishing <\/strong><\/h2>\n\n\n\n