Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":716,"date":"2023-08-03T16:53:20","date_gmt":"2023-08-03T16:53:20","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/"},"modified":"2023-08-03T16:53:20","modified_gmt":"2023-08-03T16:53:20","slug":"phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/","title":{"rendered":"Phishing for Dummies: Cisco Secure Special Edition Gabrielle Bridgers on August 3, 2023 at 12:00 pm"},"content":{"rendered":"

Introduction<\/strong><\/span><\/h2>\n

In today\u2019s ever-changing digital landscape, there is a pervasive threat that continues to grow: phishing attacks.<\/p>\n

Seriously, can\u2019t Joe in finance resist clicking on that sketchy a\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b<\/p>\n

Introduction<\/strong><\/h2>\n

In today\u2019s ever-changing digital landscape, there is a pervasive threat that continues to grow: phishing attacks.<\/p>\n

Seriously, can\u2019t Joe in finance resist clicking on that sketchy attachment? But here\u2019s the thing, phishing attacks have evolved and it\u2019s not just about sketchy attachments anymore. As technology zooms ahead and distractions pop up every second, it\u2019s no wonder phishing attacks are multiplying at an astonishing speed.<\/p>\n

Here are the top 5 emerging phishing trends that you need to be aware of (in no particular order):<\/p>\n

Artificial Intelligence (AI) is a game changer<\/strong> and has become a new favorite tool of cybercriminals to launch sophisticated phishing attacks. With AI technology, they can create fake profiles, chatbots, and convincing voice impersonations, making it harder for people to distinguish between real and fake messages. Cybercriminals have honed their skills to exploit our most human traits \u2013 trust, curiosity, and fear \u2013 with frightening expertise.
\nThroughout the Russia-Ukraine war<\/strong>, hackers have been using fake humanitarian campaigns and social media scams to lure people into downloading malware or giving away sensitive information.
\nLog4j exploitation attempts<\/strong> remain consistently high. Log4j is an exploitable weakness in a popular logging library for Java applications commonly used in enterprises, cloud hosting services and other critical systems. Cybercriminals use this gap to infiltrate and gain access.
\nPolitically motivated attacks<\/strong> targeting critical infrastructure are on the rise, as national security and critical infrastructure remain top targets.
\nNewer work models<\/strong>, such as working from home (WFH) and hybrid models, have opened new opportunities for attacks. As workers stay connected to office networks from home devices, it becomes easier for attackers to access collaboration tools and create phishing emails.<\/p>\n

To effectively combat these threats, organizations should consider adopting a holistic approach to cybersecurity. This involves implementing tools and systems that work collaboratively with users. Rather than pursuing piecemeal initiatives, this comprehensive strategy allows organizations to address vulnerabilities on all fronts. When the power of people and technology unite, the organization becomes a formidable force against phishing attacks.\u00a0<\/strong><\/p>\n

Cybersecurity as a Business Enabler<\/strong><\/h2>\n

Contrary to popular belief, cybersecurity measures are not meant to create friction in business operations. In fact, they have the power to drive resilience, growth, and success by minimizing the risk of disruptions and financial losses caused by cyberattacks.<\/p>\n

One of the key aspects of resilience is the ability to effectively manage change, whether it is positive or negative. By adopting a proactive cybersecurity approach, organizations develop the confidence and certainty to face threats head-on, anywhere, anytime.<\/p>\n

Additionally, effective cybersecurity measures play a crucial role in ensuring compliance with industry regulations and standards. This goes a long way in shielding organizations from potential legal consequences and harm. Safeguarding sensitive information not only protects your business but also contributes to building a strong reputation and credibility.<\/p>\n

Cisco can help prevent phishing attacks<\/strong><\/h2>\n

At Cisco, we understand that effective security infrastructure takes more than just tools and systems. It requires the right people and a culture of cybersecurity to work together cohesively.<\/p>\n

We\u2019re excited to announce the launch of our newest ebook, Phishing for Dummies. This resource offers valuable insights into the latest threats and trends in phishing and can benefit everyone regardless of skill level. We\u2019ve designed it to be accessible and informative, breaking down complex topics into simple, actionable steps for organizations of any size.<\/p>\n

In our eBook, we explore:<\/p>\n

New and emerging threats on the cybersecurity landscape
\nKey social, political, and technological trends driving cyberattack activity
\nCommon weaknesses in infrastructure, training, and protocols that leave organizations vulnerable
\nBest practices and strategies for mitigating cybersecurity weaknesses and staying ahead of phishing threats
\nThe Cisco Secure solutions that best combat phishing and provide strong defense against even the most sophisticated attacks<\/p>\n

When people and technology join forces, they create a powerful alliance that paves the way for a safer, more secure digital world. Let\u2019s embark on this journey together!<\/p>\n

Click here<\/a> to download the eBook<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!<\/em><\/p>\n

Cisco Secure Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Phishing attacks have evolved and it’s no wonder phishing attacks are multiplying at an astonishing speed. Learn the top 5 emerging trends.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

Introduction<\/strong><\/span><\/h2>\n

In today\u2019s ever-changing digital landscape, there is a pervasive threat that continues to grow: phishing attacks.<\/p>\n

Seriously, can\u2019t Joe in finance resist clicking on that sketchy a\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b<\/p>\n

Introduction<\/strong><\/h2>\n

In today\u2019s ever-changing digital landscape, there is a pervasive threat that continues to grow: phishing attacks.<\/p>\n

Seriously, can\u2019t Joe in finance resist clicking on that sketchy attachment? But here\u2019s the thing, phishing attacks have evolved and it\u2019s not just about sketchy attachments anymore. As technology zooms ahead and distractions pop up every second, it\u2019s no wonder phishing attacks are multiplying at an astonishing speed.<\/p>\n

Here are the top 5 emerging phishing trends that you need to be aware of (in no particular order):<\/p>\n

Artificial Intelligence (AI) is a game changer<\/strong> and has become a new favorite tool of cybercriminals to launch sophisticated phishing attacks. With AI technology, they can create fake profiles, chatbots, and convincing voice impersonations, making it harder for people to distinguish between real and fake messages. Cybercriminals have honed their skills to exploit our most human traits \u2013 trust, curiosity, and fear \u2013 with frightening expertise.
\nThroughout the Russia-Ukraine war<\/strong>, hackers have been using fake humanitarian campaigns and social media scams to lure people into downloading malware or giving away sensitive information.
\nLog4j exploitation attempts<\/strong> remain consistently high. Log4j is an exploitable weakness in a popular logging library for Java applications commonly used in enterprises, cloud hosting services and other critical systems. Cybercriminals use this gap to infiltrate and gain access.
\nPolitically motivated attacks<\/strong> targeting critical infrastructure are on the rise, as national security and critical infrastructure remain top targets.
\nNewer work models<\/strong>, such as working from home (WFH) and hybrid models, have opened new opportunities for attacks. As workers stay connected to office networks from home devices, it becomes easier for attackers to access collaboration tools and create phishing emails.<\/p>\n

To effectively combat these threats, organizations should consider adopting a holistic approach to cybersecurity. This involves implementing tools and systems that work collaboratively with users. Rather than pursuing piecemeal initiatives, this comprehensive strategy allows organizations to address vulnerabilities on all fronts. When the power of people and technology unite, the organization becomes a formidable force against phishing attacks.\u00a0<\/strong><\/p>\n

Cybersecurity as a Business Enabler<\/strong><\/h2>\n

Contrary to popular belief, cybersecurity measures are not meant to create friction in business operations. In fact, they have the power to drive resilience, growth, and success by minimizing the risk of disruptions and financial losses caused by cyberattacks.<\/p>\n

One of the key aspects of resilience is the ability to effectively manage change, whether it is positive or negative. By adopting a proactive cybersecurity approach, organizations develop the confidence and certainty to face threats head-on, anywhere, anytime.<\/p>\n

Additionally, effective cybersecurity measures play a crucial role in ensuring compliance with industry regulations and standards. This goes a long way in shielding organizations from potential legal consequences and harm. Safeguarding sensitive information not only protects your business but also contributes to building a strong reputation and credibility.<\/p>\n

Cisco can help prevent phishing attacks<\/strong><\/h2>\n

At Cisco, we understand that effective security infrastructure takes more than just tools and systems. It requires the right people and a culture of cybersecurity to work together cohesively.<\/p>\n

We\u2019re excited to announce the launch of our newest ebook, Phishing for Dummies. This resource offers valuable insights into the latest threats and trends in phishing and can benefit everyone regardless of skill level. We\u2019ve designed it to be accessible and informative, breaking down complex topics into simple, actionable steps for organizations of any size.<\/p>\n

In our eBook, we explore:<\/p>\n

New and emerging threats on the cybersecurity landscape
\nKey social, political, and technological trends driving cyberattack activity
\nCommon weaknesses in infrastructure, training, and protocols that leave organizations vulnerable
\nBest practices and strategies for mitigating cybersecurity weaknesses and staying ahead of phishing threats
\nThe Cisco Secure solutions that best combat phishing and provide strong defense against even the most sophisticated attacks<\/p>\n

When people and technology join forces, they create a powerful alliance that paves the way for a safer, more secure digital world. Let\u2019s embark on this journey together!<\/p>\n

Click here<\/a> to download the eBook<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!<\/em><\/p>\n

Cisco Secure Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Phishing attacks have evolved and it’s no wonder phishing attacks are multiplying at an astonishing speed. Learn the top 5 emerging trends.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":717,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-716","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nPhishing for Dummies: Cisco Secure Special Edition Gabrielle Bridgers on August 3, 2023 at 12:00 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing for Dummies: Cisco Secure Special Edition Gabrielle Bridgers on August 3, 2023 at 12:00 pm\" \/>\n<meta property=\"og:description\" content=\"Introduction In today\u2019s ever-changing digital landscape, there is a pervasive threat that continues to grow: phishing attacks. Seriously, can\u2019t Joe in finance resist clicking on that sketchy a\u2026 Read more on Cisco Blogs \u200b Introduction In today\u2019s ever-changing digital landscape, there is a pervasive threat that continues to grow: phishing attacks. Seriously, can\u2019t Joe in finance resist clicking on that sketchy attachment? But here\u2019s the thing, phishing attacks have evolved and it\u2019s not just about sketchy attachments anymore. As technology zooms ahead and distractions pop up every second, it\u2019s no wonder phishing attacks are multiplying at an astonishing speed. Here are the top 5 emerging phishing trends that you need to be aware of (in no particular order): Artificial Intelligence (AI) is a game changer and has become a new favorite tool of cybercriminals to launch sophisticated phishing attacks. With AI technology, they can create fake profiles, chatbots, and convincing voice impersonations, making it harder for people to distinguish between real and fake messages. Cybercriminals have honed their skills to exploit our most human traits \u2013 trust, curiosity, and fear \u2013 with frightening expertise. Throughout the Russia-Ukraine war, hackers have been using fake humanitarian campaigns and social media scams to lure people into downloading malware or giving away sensitive information. Log4j exploitation attempts remain consistently high. Log4j is an exploitable weakness in a popular logging library for Java applications commonly used in enterprises, cloud hosting services and other critical systems. Cybercriminals use this gap to infiltrate and gain access. Politically motivated attacks targeting critical infrastructure are on the rise, as national security and critical infrastructure remain top targets. Newer work models, such as working from home (WFH) and hybrid models, have opened new opportunities for attacks. As workers stay connected to office networks from home devices, it becomes easier for attackers to access collaboration tools and create phishing emails. To effectively combat these threats, organizations should consider adopting a holistic approach to cybersecurity. This involves implementing tools and systems that work collaboratively with users. Rather than pursuing piecemeal initiatives, this comprehensive strategy allows organizations to address vulnerabilities on all fronts. When the power of people and technology unite, the organization becomes a formidable force against phishing attacks.\u00a0 Cybersecurity as a Business Enabler Contrary to popular belief, cybersecurity measures are not meant to create friction in business operations. In fact, they have the power to drive resilience, growth, and success by minimizing the risk of disruptions and financial losses caused by cyberattacks. One of the key aspects of resilience is the ability to effectively manage change, whether it is positive or negative. By adopting a proactive cybersecurity approach, organizations develop the confidence and certainty to face threats head-on, anywhere, anytime. Additionally, effective cybersecurity measures play a crucial role in ensuring compliance with industry regulations and standards. This goes a long way in shielding organizations from potential legal consequences and harm. Safeguarding sensitive information not only protects your business but also contributes to building a strong reputation and credibility. Cisco can help prevent phishing attacks At Cisco, we understand that effective security infrastructure takes more than just tools and systems. It requires the right people and a culture of cybersecurity to work together cohesively. We\u2019re excited to announce the launch of our newest ebook, Phishing for Dummies. This resource offers valuable insights into the latest threats and trends in phishing and can benefit everyone regardless of skill level. We\u2019ve designed it to be accessible and informative, breaking down complex topics into simple, actionable steps for organizations of any size. In our eBook, we explore: New and emerging threats on the cybersecurity landscape Key social, political, and technological trends driving cyberattack activity Common weaknesses in infrastructure, training, and protocols that leave organizations vulnerable Best practices and strategies for mitigating cybersecurity weaknesses and staying ahead of phishing threats The Cisco Secure solutions that best combat phishing and provide strong defense against even the most sophisticated attacks When people and technology join forces, they create a powerful alliance that paves the way for a safer, more secure digital world. Let\u2019s embark on this journey together! Click here to download the eBook We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social! Cisco Secure Social Channels InstagramFacebookTwitterLinkedIn Share Share: \u00a0\u00a0Phishing attacks have evolved and it's no wonder phishing attacks are multiplying at an astonishing speed. Learn the top 5 emerging trends.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-03T16:53:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16281289-yse8Dg.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Phishing for Dummies: Cisco Secure Special Edition Gabrielle Bridgers on August 3, 2023 at 12:00 pm\",\"datePublished\":\"2023-08-03T16:53:20+00:00\",\"dateModified\":\"2023-08-03T16:53:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/\"},\"wordCount\":764,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16281289-yse8Dg.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/\",\"name\":\"Phishing for Dummies: Cisco Secure Special Edition Gabrielle Bridgers on August 3, 2023 at 12:00 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16281289-yse8Dg.gif\",\"datePublished\":\"2023-08-03T16:53:20+00:00\",\"dateModified\":\"2023-08-03T16:53:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16281289-yse8Dg.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16281289-yse8Dg.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing for Dummies: Cisco Secure Special Edition Gabrielle Bridgers on August 3, 2023 at 12:00 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Phishing for Dummies: Cisco Secure Special Edition Gabrielle Bridgers on August 3, 2023 at 12:00 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/","og_locale":"en_US","og_type":"article","og_title":"Phishing for Dummies: Cisco Secure Special Edition Gabrielle Bridgers on August 3, 2023 at 12:00 pm","og_description":"Introduction In today\u2019s ever-changing digital landscape, there is a pervasive threat that continues to grow: phishing attacks. Seriously, can\u2019t Joe in finance resist clicking on that sketchy a\u2026 Read more on Cisco Blogs \u200b Introduction In today\u2019s ever-changing digital landscape, there is a pervasive threat that continues to grow: phishing attacks. Seriously, can\u2019t Joe in finance resist clicking on that sketchy attachment? But here\u2019s the thing, phishing attacks have evolved and it\u2019s not just about sketchy attachments anymore. As technology zooms ahead and distractions pop up every second, it\u2019s no wonder phishing attacks are multiplying at an astonishing speed. Here are the top 5 emerging phishing trends that you need to be aware of (in no particular order): Artificial Intelligence (AI) is a game changer and has become a new favorite tool of cybercriminals to launch sophisticated phishing attacks. With AI technology, they can create fake profiles, chatbots, and convincing voice impersonations, making it harder for people to distinguish between real and fake messages. Cybercriminals have honed their skills to exploit our most human traits \u2013 trust, curiosity, and fear \u2013 with frightening expertise. Throughout the Russia-Ukraine war, hackers have been using fake humanitarian campaigns and social media scams to lure people into downloading malware or giving away sensitive information. Log4j exploitation attempts remain consistently high. Log4j is an exploitable weakness in a popular logging library for Java applications commonly used in enterprises, cloud hosting services and other critical systems. Cybercriminals use this gap to infiltrate and gain access. Politically motivated attacks targeting critical infrastructure are on the rise, as national security and critical infrastructure remain top targets. Newer work models, such as working from home (WFH) and hybrid models, have opened new opportunities for attacks. As workers stay connected to office networks from home devices, it becomes easier for attackers to access collaboration tools and create phishing emails. To effectively combat these threats, organizations should consider adopting a holistic approach to cybersecurity. This involves implementing tools and systems that work collaboratively with users. Rather than pursuing piecemeal initiatives, this comprehensive strategy allows organizations to address vulnerabilities on all fronts. When the power of people and technology unite, the organization becomes a formidable force against phishing attacks.\u00a0 Cybersecurity as a Business Enabler Contrary to popular belief, cybersecurity measures are not meant to create friction in business operations. In fact, they have the power to drive resilience, growth, and success by minimizing the risk of disruptions and financial losses caused by cyberattacks. One of the key aspects of resilience is the ability to effectively manage change, whether it is positive or negative. By adopting a proactive cybersecurity approach, organizations develop the confidence and certainty to face threats head-on, anywhere, anytime. Additionally, effective cybersecurity measures play a crucial role in ensuring compliance with industry regulations and standards. This goes a long way in shielding organizations from potential legal consequences and harm. Safeguarding sensitive information not only protects your business but also contributes to building a strong reputation and credibility. Cisco can help prevent phishing attacks At Cisco, we understand that effective security infrastructure takes more than just tools and systems. It requires the right people and a culture of cybersecurity to work together cohesively. We\u2019re excited to announce the launch of our newest ebook, Phishing for Dummies. This resource offers valuable insights into the latest threats and trends in phishing and can benefit everyone regardless of skill level. We\u2019ve designed it to be accessible and informative, breaking down complex topics into simple, actionable steps for organizations of any size. In our eBook, we explore: New and emerging threats on the cybersecurity landscape Key social, political, and technological trends driving cyberattack activity Common weaknesses in infrastructure, training, and protocols that leave organizations vulnerable Best practices and strategies for mitigating cybersecurity weaknesses and staying ahead of phishing threats The Cisco Secure solutions that best combat phishing and provide strong defense against even the most sophisticated attacks When people and technology join forces, they create a powerful alliance that paves the way for a safer, more secure digital world. Let\u2019s embark on this journey together! Click here to download the eBook We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social! Cisco Secure Social Channels InstagramFacebookTwitterLinkedIn Share Share: \u00a0\u00a0Phishing attacks have evolved and it's no wonder phishing attacks are multiplying at an astonishing speed. Learn the top 5 emerging trends.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/","og_site_name":"JHC","article_published_time":"2023-08-03T16:53:20+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16281289-yse8Dg.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/"},"author":{"name":"","@id":""},"headline":"Phishing for Dummies: Cisco Secure Special Edition Gabrielle Bridgers on August 3, 2023 at 12:00 pm","datePublished":"2023-08-03T16:53:20+00:00","dateModified":"2023-08-03T16:53:20+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/"},"wordCount":764,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16281289-yse8Dg.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/","url":"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/","name":"Phishing for Dummies: Cisco Secure Special Edition Gabrielle Bridgers on August 3, 2023 at 12:00 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16281289-yse8Dg.gif","datePublished":"2023-08-03T16:53:20+00:00","dateModified":"2023-08-03T16:53:20+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16281289-yse8Dg.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16281289-yse8Dg.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/phishing-for-dummies-cisco-secure-special-edition-gabrielle-bridgers-on-august-3-2023-at-1200-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Phishing for Dummies: Cisco Secure Special Edition Gabrielle Bridgers on August 3, 2023 at 12:00 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=716"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/716\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/717"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}