Bank robbers have to meticulously plan the perfect get-away. Burglars need to be careful that their DNA is not left at the scene of the crime. Car thieves must constantly dodge security cameras to avoid getting caught. Cybercriminals, on the other hand, must live relatively stress-free lives, considering their biggest worry is whether or not you’ll type in your password.
It’s called credential harvesting and it’s largely considered the foundation of email phishing. If you think about it, the easiest way for anyone to get into your secure files is by simply using your password. And, for many of us these days, we have a single sign-on (a.k.a one password) that provides access to the bulk of our personal and company files.
Consider these terrifying password statistics:1
Here are the basic steps:
Now, if you think credential harvesting couldn’t happen to you, consider the fact that a business falls victim to a ransomware attack every eleven seconds.1 This is especially true in the U.S., which has millions more reported cybercrimes than any other country.2 In 2021 alone, the FBI reported $6.9 billion in losses with phishing attacks being the top culprit.2 It might even make you wonder where these cybercriminals are coming from. Well, sadly, becoming a hacker or cyber thief is easier than you think. In fact, there are plenty of blog posts and online videos that attempt to teach the average Joe how to set up their own successful credential harvesting scheme. That alone should tell you two things — first, more people than you realize (at all skill levels) could be attempting this type of email phishing scheme. And, secondly, you should take the steps now to protect yourself, your employees, and your company. The best way to start is by using two-factor authentication for your logins, and also consider the many benefits of hiring a third-party email security expert to uncover these types of credential harvesting threats before they wreak havoc on your business.
INKY can protect you from becoming a victim of credential harvesting. A cloud-based email security platform, INKY proactively and instantly scans inbound, internal, and outbound emails to eliminate phishing and malware. INKY's patented technology sanitizes all emails, detects foul play, disarms phishing emails, and reconstructs each email using safe and standard HTML5. From there, INKY’s Email Assistant injects a user-friendly HTML banner with one or more of nearly 60 warning messages to educate the recipient with specifics of the threat. With INKY, you can even report a phishing email with a click, from any device or email client. Request a demo of INKY today.
Learn more about credential harvesting and see how INKY caught an attempted harvester posing as the Department of Justice: Read INKY's Special Report on Credential Harvesting.
----------------------
INKY is an award-winning, cloud-based email security solution developed to proactively eliminate phishing emails and malware while simultaneously providing real-time assistance to employees handling suspicious emails so they can make safer decisions. INKY’s patented technology incorporates sophisticated computer vision, machine learning models, social profiling, and stylometry algorithms to effectively sanitize emails, rewrite malicious links, detect and block security threats, mitigate sender impersonation, and more. Cost-effective and powerful, the INKY platform was developed for mobile-first IT organizations and works seamlessly on any device, operating system, and mail client. Learn more about INKY™ or request an online demonstration today.
1Source: https://webtribunal.net/blog/password-stats/
2Source: https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf