-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Incident Response in the Age of Cloud
By :

It is likely that, at some point, you will get a malicious email claiming to be from a reliable source, or you'll accidentally visit a phishing website that looks genuine; it is just a matter of time. In the next few sections, we will go through a few reporting methods that you or employees can use to report a phishing attack.
There are many reasons why you or one of your employees might become suspicious about phishing activity. An email could be spam or a type of malicious email. No matter what, you should unquestionably report a suspicious email to the appropriate authority through your email program or web interface. This information shared by you is gathered and applied to determining whether something is spam or malicious, and whether or not to automatically put it in the spam folder. To protect your organization and your data, don't respond to suspicious emails and always report them...
Change the font size
Change margin width
Change background colour