While updating the security awareness training, a security analyst wants to address issues created if vendors' email accounts are compromised. Which of the following recommendations should the security analyst include in the training?
Be alert to unexpected requests from familiar email addresses.
Vendors' email accounts can be compromised, leading to potential social engineering attacks where attackers impersonate familiar contacts. Training employees to be vigilant about unexpected requests, even from known contacts, helps mitigate the risk of falling victim to these deceptive schemes.
While caution around images in emails is prudent, it does not directly address the primary risk posed by compromised email accounts. This recommendation focuses more on recognizing phishing emails rather than the broader issue of familiar contacts being targeted, which is the main concern when a known vendor's account is compromised.
Deleting emails from unknown partners is a reactive measure that may prevent some phishing attempts but does not address the issue of compromised accounts from known vendors. Instead, employees must be trained to scrutinize communications from familiar contacts, as these can be the source of highly convincing attacks.
While sending invoices as attachments may add a layer of security by preventing direct links in emails, it does not directly address the risk of compromised accounts. Attackers can still send malicious attachments or phishing requests disguised as legitimate communications, thus this recommendation is not sufficient to mitigate the specific risks associated with compromised email accounts.
Understanding the risks of compromised vendor email accounts is crucial for maintaining security. Training employees to be alert to unexpected requests from familiar email addresses directly targets the potential for social engineering attacks stemming from such compromises. Recognizing that attackers may exploit trusted contacts to bypass scrutiny is essential for building a robust security awareness culture within an organization.
Related Questions
View allWhich of the following is the most likely reason a security analyst wo...
A company receives an alert that a network device vendor, which is wid...
A security analyst receives an alert categorized as suspicious activit...
Which of the following solutions will most likely be used in the finan...
A university uses two different cloud solutions for storing student da...
Related Quizzes
View allCompTIA A Plus Certification Exam
CompTIA A Plus Exam Questions
CompTIA A Plus 1001 Exams Practice
CompTIA A Plus Practice Exam
CompTIA CySA+ Cybersecurity Analyst Certification all in One Exam Guide
CompTIA Network Plus Certification Exam Quiz
Free CompTIA Security Plus Practice Test
CompTIA Security Plus Simulation Questions
CompTIA Security Plus 501 Practice Questions
CompTIA Security Plus Example Questions
- ✓ 500+ Practice Questions
- ✓ Detailed Explanations
- ✓ Progress Analytics
- ✓ Exam Simulations