Phishing Attacks Checklist

2 Min Read
Content...
Phishing Attacks Checklist

Small business phishing attacks always question suspicious or unusual requests.

Important to scan for malware and change passwords as soon as possible if you suspect a phishing attack.

Ready to dive in?
Start Your Free Trial Today

We have created a few checklists to help Small Business Cyber Security.

Phishing Attacks Checklist

Suspicious or unusual requests.
Account Configuration

Staff should only have basic email privileges so the lowest level rights needed to perform their job.

Administrator accounts have many more access rights if unauthorised access is achieved can be far more damaging than basic user account.

Use Two-Factor Authentication

Two-factor authentication (2FA) attackers won’t be able to access your account even if they know your passwords.

Operating Procedure

Think about your usual working procedures and how you can help make common tricks less likely to succeed.

Examples: Unusual requests / Invoices, Impersonating banks

Report Suspicious Emails

If any suspicion you must take steps to scan for malware and change passwords immediately.

Signs of Phishing

Phishing emails fit a certain mould so can look out for a number of warning signs.

Signs of Phishing attack checklist

Digital Footprint

Attackers use publicly available information to make their phishing messages more convincing.

This can be from your website or social media accounts.

Frequently asked questions
Looking for more info? Here are some things we're commonly asked
Checklist

Does the running of your business include several repetitive tasks? If there’s no guidance or procedure in place, it’s possible for some of the steps in the process to get forgotten. This is why checklists are important.

People get distracted, and when something gets forgotten, it’s much harder to recover than if they’d completed the task right in the first place.

Guidance every step of the way makes sure something is completed perfectly every time.

Read More: Why is a Checklist Important?

We all carry enormous knowledge and experience that we want to apply effectively, but we are all prone to make mistakes. There’s only so much we can store in our heads without forgetting something. How to maximise our use of knowledge?

The simple answer to this problem is to use checklists.

Read More:  Power Of A Simple Checklist To Reduce Mistakes

How many types of checklists are there? Two. What are the two types of checklists? Read-Do and Do-Confirm checklists are about how you use checklists.

Read More: Types of checklist: What are the two most powerful Checklist Types?

A checklist is a way to document each step needed to complete a task. A detailed set of instructions, a guide of how something is done. 

Checklist software allows you to document every step of a process to be used over and over again.

Read More: Checklist Software

Yep, like every other website we also use
delicious cookies to track you.