当前位置:网站首页>Phishing mail disposal
Phishing mail disposal
2022-07-29 06:35:00 【Zhongyun era - defense testable - Xiaoyu】
Phishing email found
The ways of discovery are as follows : Mail system abnormal login alarm 、 Employees report 、 Abnormal behavior alarm 、 Email honey bait alarm
It is recommended to access the intelligence data of Weibo or Qianxin . What happens to the content of the email URL Do a scan , You can find a lot of abnormal Links
Phishing mail disposal check items - FreeBuf Network security industry portal
Management
Block the sites involved in phishing email content in the office area 、URL visit
According to the actual situation of the office environment, you can manage online behavior 、 Router 、 Shielding on the switch
The content of the email involves domain name 、IP Should be shielded
To visit the intranet of phishing websites IP For recording , In order to trace the possible consequences of subsequent investigation
Block phishing emails
Block phishing email source email domain name
Block phishing email sources IP
If possible, it can be shielded according to the email content
Delete phishing messages that are not received by the client on the mail server
Users who receive phishing emails
Log backtracking according to the sender of phishing mail
In addition to checking how many people receive phishing emails , We also need to check whether the company's address book is leaked . use TOP500 The attack method of sending phishing emails by hitting the database with surnames is relatively simple compared with the subsequent protection . If it is found that the company's address book sequence is used, it is necessary to check the leakage time of the address book according to the resignation of the address book and the new employees . After all, targeted social work libraries are more powerful than TOP100、TOP500 Much larger
Notify users who have received phishing emails to process
Delete phishing messages
System encryption
Complete anti drug campaign
follow-up : Tracing to the source 、 Staff training to enhance safety awareness
边栏推荐
猜你喜欢

FIR filter design (2) -- vivado calls IP core to design FIR filter

Scanbasepackages scanning range configuration

Arrays&Object&System&Math&Random&包装类

Sequence list and linked list

Ue5 light shadow basic shadow full resolution sawtooth shadow solution lumen

Design of IIR filter based on FPGA

Vivado IP核之浮点数乘除法 Floating-point

day17_ Under collection

Design and simulation code of 4-bit subtracter based on FPGA

Arrays & object & System & Math & random & Packaging
随机推荐
day12_ Multithreading
基于FPGA的4位减法器设计及仿真代码
Navicat for Oracle Cannot create oci environment
day13_ Under multithreading
虹科分享 | 带你全面了解“CAN总线错误”(四)——在实践中生产和记录CAN错误
Handwritten digit recognition using neural network
Clickhouse failed to import CSV without error but no data
什么是DNS放大攻击
Rowkey design
通过os-shell引发的mysql拿shell的思考
day16-集合上
Noi online 2022 popular group problem solving & personal understanding
虹科Automation softPLC | 虹科KPA MoDK运行环境与搭建步骤(2)——MoDK运行环境搭建
虹科案例 | PAC:一种整合了softPLC控制逻辑、HMI和其他服务功能的集成控制解决方案
OSPF理论介绍
Redshift restore SP effect - SP map export settings and map import configuration
什么是撞库及撞库攻击的基本原理
c语言问题
Vivado IP核之浮点数开方 Floating-point
盘点 | 全球关键信息基础设施网络安全大事件