November 2023

NAVIGATING... from page 42.

is a great way to ensure someone isn’t “spoofing” someone you know. Another thing to hover over is any link in an e-mail message. Oftentimes the link in a malicious e-mail will say it goes to one place but when you mouse over it you note it goes to another.

The final and best layer is to use trusted channels to verify anything that feels odd. That means if you get a notification for a suspicious order, you login to your account with the vendor to see if that order exists on their page. This is similar to if you get a suspicious call on your phone from someone claiming to be from your bank, the safest thing to do is ask what department they are with, hang up, and call your bank asking for the department to confirm it is legitimate. “The real danger with spear phishing comes when an attack is coming from the real mailbox of someone you know” Spear phishing basically takes all of the above ideas and adds the layer of a customized message targeting someone. A great example is some one using LinkedIn to identify two companies that partner together and then sending an e-mail to one claim ing to be from someone who really works at the other. These types of attacks are often enhanced with data gleaned from compromised e-mails or social media to make them look even better, incorporating things like e-mail signatures, nicknames, and other things to lull you into thinking it is real.

The next layer is using some of that suspicion we mentioned earlier. Hovering your mouse or finger over the sender to make sure the sender’s name matches the e-mail address

2023 Marks INTEGRA’s

Anniversary!

The Value of Expertise in Community Association Management

To learn more, visit IntegraMgtCorp.com or contact Ed San George at esangeorge@integramgtcorp.com

200 Valley Road, Suite 203 Mt. Arlington, NJ 07856 (973) 770-1500

CONTINUES ON PAGE 46

44

NOVEMBER 2023

Made with FlippingBook Online newsletter creator