header image icon - mountains

Phishing Attacks Checklist

Phishing Attacks Checklist 1

Small business phishing attacks always question suspicious or  unusual requests.

Important to scan for malware and change passwords as soon as possible if you suspect a phishing attack.

We have created a few checklists to help Small Business Cyber Security.

Small Business Phishing Attacks Checklist

Phishing Attacks Checklist 2

Account Configuration

Staff should only have basic email privileges so the lowest level rights needed to perform their job.

Administrator accounts have many more access rights if unauthorised access is achieved can be far more damaging than basic user account.

Phishing Attacks Checklist 2

Use Two-Factor Authentication

Two-factor authentication (2FA) attackers won’t be able to access your account even if they know your passwords.

Phishing Attacks Checklist 2

Operating Procedure

Think about your usual working procedures and how you can help make common tricks less likely to succeed.

Examples: Unusual requests / Invoices, Impersonating banks

Phishing Attacks Checklist 2

Report Suspicious Emails

If any suspicion you must take steps to scan for malware and change passwords immediately.

Phishing Attacks Checklist 2

Signs of Phishing

Phishing emails fit a certain mould so can look out for a number of warning signs.

Signs of Phishing attack checklist

Phishing Attacks Checklist 2

Digital Footprint

Attackers use publicly available information to make their phishing messages more convincing.

This can be from your website or social media accounts.

Related Checklists

Louise Burton-Payne

Checklist Ambassador

Learn to Work Smarter, not Harder!

Leave a Reply

Your email address will not be published. Required fields are marked *