Don’t click that link!
Today, phishing scams can be extremely sophisticated and may require a practiced eye for employees to recognize a “phishy” email. They have moved beyond the well-known Nigerian Prince scams requesting money, and now may camouflage as a reputable company or bank, copying logos or websites, but with something a bit askew. For instance, the email address may end in simply “.co” rather than “.com”, or appear to come from within your own organization.
Training your employees to recognize phishing emails and promptly delete (and double delete) them from the system can go a long way to help protect your company’s email system. And if employees mistakenly click on a link in a phony email, they must report it immediately and run antivirus software.
Most importantly, employees should be informed of proper protocol to protect company security, and they should be able to report a mistaken “click” immediately without fear of retribution. It’s more important to you and your employees to protect the systems in place.
Sometimes, spotting suspicious emails is easy. But as hackers get more and more sophisticated, employers need to know how to train their employees to spot high-tech email viruses.
Join us on February 27 for details on positive steps you can take to avoid email hacking at work by attending our in-depth webinar with a leading expert attorney on the topic of cybersecurity and hacking. Certified Ethical Hacker (C|EH) and Certified Information Privacy Professional (CIPP/US) Dan Nelson, partner and co-chair of Armstrong Teasdale’s Data Security & Privacy Practice Group, will provide guidance on how to train your employees to spot sophisticated company email hacks and avoid cyber threats.
You’ll learn how to:
- Ensure that your organization has reliable anti-hacking cybersecurity software in place
- Train employees to recognize phishing emails and suspect links
- Avoid opening or clicking on suspect emails—and learn to recognize logos from reputable companies that don’t quite look right
- Look for suspicious email addresses before opening
- Be cautious when seemingly personalized emails come on a bit too dramatic or aggressive
- Set policies for employees so they know what to do if they accidentally open or click on a suspicious link
- Understand the legal ramifications of having your organization’s email system hacked
- Emphasize to employees that their personal data could be breached as well through a phishing scam or virus
- And much more!
YOUR EXPERT INSTRUCTOR
Daniel C. Nelson is both a commercial litigator and a privacy and data security lawyer. Mr. Nelson is among the few U.S. attorneys to hold the title of Certified Ethical Hacker (C|EH), which means he has been trained to break into computers, but for the right reasons. His combined interest in technology and the desire to help clients protect their privacy and sensitive data motivated him to take the unusual step of becoming what’s known as a “white hat” hacker.
In addition to his ethical hacking credential, Mr. Nelson is a Certified Information Privacy Professional (CIPP/US). This credential means he knows privacy laws and regulations and how to apply them.
This program has been pre-approved for 1.5 hours of general recertification credit toward PHR and SPHR recertification.
Business & Legal Resources (BLR) is recognized by SHRM to offer Professional Development Credits (PDCs) for the SHRM-CP or SHRM-SCP. This program is valid for 1.5 PDCs for the SHRM-CP or SHRM-SCP.