Whaling – an advanced variant of phishing that targets high-value individuals within a business via email – is one of my clients’ biggest cybersecurity concerns. As more stories of attacks on directors and C-suite executives emerge (with some losing five-figure sums as a result), it’s difficult to avoid that question, “could it be me?”.

My clients are savvy people and they know that even with the best cybersecurity software, a whaling attack could still hit their business with catastrophic consequences. This is because whalers rely on a combination of social engineering (check out the video below for a full explanation) and exploiting weaknesses in IT security policies to persuade targets to honour their requests. Basically, whalers depend on human error.

Nobody is safe from being targeted or imitated, but everybody can take steps to prevent a successful whaling attempt. Whether you’re in a senior or entry-level position, company-wide education, diligence and enforcement are fundamental to intercepting and preventing a whaling attack.

In the latest episode of our Ask the Expert series, I explain what whaling is, the potential damage it can cause, and how to protect your business. I also share some concerning whaling statistics that I think you’ll find really shocking!

Check out the video below and remember to share with colleagues, business partners or friends that may find it useful – especially those that are in senior roles or work in finance, IT or HR.

 

 

If you’ve any cybersecurity concerns, you may find our Cybersecurity Scorecard useful. In just five minutes, it gives you visibility of the risks and vulnerabilities in your business and even provides a personalised risk score and advice. Download it for free here – all results are confidential.

I hope you enjoy the episode!

Tom

by Tom Mercer

Customer Relationship Manager - MSP

A business technologies specialist for over 8 years, with unrivalled expertise in helping customers to maximise their business systems, hosted solutions and cybersecurity through support and account management.

SHARE: