{"id":41339,"date":"2021-08-20T14:32:46","date_gmt":"2021-08-20T18:32:46","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=41339"},"modified":"2021-09-17T07:24:42","modified_gmt":"2021-09-17T11:24:42","slug":"corporate-phishing-protection","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/corporate-phishing-protection\/41339\/","title":{"rendered":"How to protect businesses from phishing"},"content":{"rendered":"<p>Security solutions for businesses are constantly improving, forcing cybercriminals to spend more time and money on breaking into corporate networks \u2014 and, increasingly, relying on social engineering. Exploiting the human factor and making use of readily available contact info (such as for HR and PR staff), crooks can extract login credentials from unsuspecting employees without having to worry about those ever-improving cybersecurity solutions.<\/p>\n<p>Unfortunately, there is no magic bullet to protect companies from phishing; the problem requires both organizational and technical measures. Here\u2019s how to implement such protection in practice.<\/p>\n<h2>Protect your mail server<\/h2>\n<p>Browsers and some e-mail clients have their own security filters, but cybercriminals have many techniques to bypass them. Some, for example, <a href=\"https:\/\/www.kaspersky.com\/blog\/phishing-via-esp\/37467\/\" target=\"_blank\" rel=\"noopener nofollow\">use e-mail marketing services<\/a>.<\/p>\n<p>Preventing phishing e-mails from reaching employees\u2019 mailboxes at all is a strong starting point. Use a security solution at the mail gateway level such as <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/mail-server?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksms___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security for Mail Server<\/a>, which not only checks links in incoming mail, but also detects threats in sent files.<\/p>\n<h2>Protect Microsoft Office 365 services<\/h2>\n<p>These days, instead of deploying their own mail servers, many companies use cloud services, primarily MS Office 365. Microsoft Office account data, which potentially gives attackers access to services such as OneDrive and SharePoint that may store confidential information and contact details, is a <a href=\"https:\/\/www.kaspersky.com\/blog\/office-365-credentials-hunt\/36194\/\" target=\"_blank\" rel=\"noopener nofollow\">frequent and unsurprising target of phishing attacks<\/a>. \u00a0Even if an employee knows in theory that they need to check messages carefully, they might still click a link or forward a message to colleagues if they\u2019re in a hurry.<\/p>\n<p>Microsoft has its own, imperfect security technologies, which you can \u2014 and should \u2014 strengthen with additional layers of protection. For example, <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/microsoft-office-365-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kso365___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security for Microsoft Office 365<\/a> prevents the spread of threats through Office services, guards against spam and phishing, and removes malicious attachments.<\/p>\n<h2>Train employees<\/h2>\n<p>Today\u2019s cybercriminal bag of tricks includes <a href=\"https:\/\/www.kaspersky.com\/blog\/36c3-fake-emails\/32362\/\" target=\"_blank\" rel=\"noopener nofollow\">malicious links hidden in e-mails<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/icedid-qbot-banking-trojans-in-spam\/40552\/\" target=\"_blank\" rel=\"noopener nofollow\">attached Trojans disguised as documents<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-from-smishing\/39491\/\" target=\"_blank\" rel=\"noopener nofollow\">misleading text messages<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-from-vishing\/40410\/\" target=\"_blank\" rel=\"noopener nofollow\">phone calls<\/a>, and more. Phishing messages can even come from a <a href=\"https:\/\/www.kaspersky.com\/blog\/hosting-provider-phishing-web-page\/38783\/\" target=\"_blank\" rel=\"noopener nofollow\">hosting provider<\/a> or a partner company if one of its employees\u2019 accounts is compromised. Employees must be aware of these schemes and be able to spot suspicious e-mails.<\/p>\n<p>Staff cybersecurity awareness training can come from your own IT department or outside experts. Additionally, online tools such as <a href=\"https:\/\/k-asap.com\/en\/?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a> help employees learn in a convenient, on-the-job format.<\/p>\n<h2>Send test phishing e-mails<\/h2>\n<p>Testing employees by sending them relevant phishing e-mails enables \u2014 or forces \u2014 employees to apply their knowledge in practice and prepare for real incidents. Testing also highlights people and areas in need of improvement.<\/p>\n<h2>Provide contact info for someone who can help check suspicious e-mails<\/h2>\n<p>After basic cybersecurity training, employees will be able to spot most phishing e-mails by noting visual cues such as unknown sender address, wrong company logo, and typos. In some cases, however, determining whether a message is safe may require the help of an expert. Include your company\u2019s best contact for evaluating suspicious messages in the onboarding guide and prominently on the corporate portal.<\/p>\n<h2>Protect workstations<\/h2>\n<p>Even experienced and sharp-eyed employees make mistakes. Phishing links may appear in an employee\u2019s personal e-mail or come in through a messaging app \u2014 channels your security systems do not control. Therefore, installing a <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">security solution<\/a> on every Internet-connected workstation is crucial. That way, even if a phishing link reaches the target and gets clicked, the redirect will be blocked.<\/p>\n<h2>Protect mobile devices<\/h2>\n<p>Employees use smartphones to view mail and financial documents, and they chat in messaging apps. Mobile devices have always posed a threat to corporate security, and do so even more in this era of mass remote work. To thwart phishing attacks on mobile devices, secure those devices as well, with <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business<\/a>, which protects both workstations and mobile phones.<\/p>\n<h2>Stay ahead of criminals<\/h2>\n<p>Phishers are forever coming up with new schemes, such that even the savviest pro might one day unwittingly hand over the keys to their mail or other account. With a few commonsense requirements, you can ensure cybercriminals get their hands on as little confidential information as possible.<\/p>\n<h3>Enable two-factor authentication<\/h3>\n<p>Turn on two-factor authentication for all online corporate services. With 2FA enabled, even if attackers discover the credentials for a corporate account or an e-mail password, they won\u2019t be able to get in.<\/p>\n<h3>Require unique passwords<\/h3>\n<p>Instruct employees to use unique passwords for each work service or device. Then, even if phishers get one password, no other resources will be at risk.<\/p>\n<h3>Adhere to the principle of least privilege<\/h3>\n<p>If employees have access rights only to the servers, cloud storage, and other valuable assets that they truly need, cybercriminals will not be able to inflict too much damage, even if they gain control of a corporate account.<\/p>\n<h2>Action plan<\/h2>\n<p>By following these simple tips, you can protect your employees\u00a0\u2014 and thus your business \u2014 from the phishing menace. In brief:<\/p>\n<ul>\n<li>Protect your mail server;<\/li>\n<li>Protect your Microsoft Office services;<\/li>\n<li>Train employees;<\/li>\n<li>Simulate phishing attacks to reinforce training;<\/li>\n<li>Give staff a way to contact someone who can help check suspicious e-mails;<\/li>\n<li>Protect workstations;<\/li>\n<li>Secure mobile devices;<\/li>\n<li>Enable two-factor authentication wherever possible;<\/li>\n<li>Use reliable security solutions.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>One click on a phishing link can cost a company both money and reputation. Here\u2019s how to protect your company from phishing.<\/p>\n","protected":false},"author":2484,"featured_media":41340,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051,3052],"tags":[19,2388,76,2556,131],"class_list":{"0":"post-41339","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-email","11":"tag-employees","12":"tag-phishing","13":"tag-security-awareness","14":"tag-tips"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/corporate-phishing-protection\/41339\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/corporate-phishing-protection\/23211\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/corporate-phishing-protection\/18698\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/corporate-phishing-protection\/25237\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/corporate-phishing-protection\/23305\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/corporate-phishing-protection\/31303\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/corporate-phishing-protection\/15159\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/corporate-phishing-protection\/31476\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/corporate-phishing-protection\/24258\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/corporate-phishing-protection\/29585\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/corporate-phishing-protection\/29390\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/41339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=41339"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/41339\/revisions"}],"predecessor-version":[{"id":41343,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/41339\/revisions\/41343"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/41340"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=41339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=41339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=41339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}