Phishing 101: 5 Ways to Spot Fraudulent Emails (by BAE Systems )

There have been a number of high-profile cyber breaches that, which upon inspection, were the result of phishing attacks. These malicious e-mails aim to collect personal information and employee credentials to steal intelligence from an organization’s network or to install malware such as a data-stealing Trojan.

Phishing attacks must be convincing enough to bypass security screening and bait a recipient into clicking through to an infected website. Molding workers into hardened cynics to defend against phishing isn’t the path forward. Instead, businesses need to recognize the signs of an attack and train their employees on how to act when even something small is just not quite right. For more details on what companies can do visit Bill Sweeney’s comments on BAE Systems’ blog.

For further information you can email Bill or call Greg Kirsch at (416) 788-2888.

Bill’s Bio

Bill Sweeney is the vice president of the financial services practice of BAE Systems Applied Intelligence and is entrusted with cultivating innovative technology solutions in cyber security, fraud prevention and regulatory compliance for buy- and sell-side professionals worldwide. For more than 20 years, Bill has leveraged emerging and state-of-the-art software and services to empower and transform investment operations as well as control risks. Prior to joining BAE Systems Applied Intelligence, Bill served as chief information officer of compliance and legal technology for global financial services conglomerate Citi. From 2008 to 2012, he was director of research technology for Bridgewater Associates, the largest global hedge fund by assets with $160 billion. In addition to serving in senior roles for several technology boutiques, Bill also was CTO of HSBC. He is a graduate of Manhattan College and earned his master’s degree in computer science from the University of Southern California.