HomeNewsIndia NewsEmail-based Cyber Attacks Continue to Target Users in India

    Email-based Cyber Attacks Continue to Target Users in India

    Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, today remind corporate users in India that email remains one of the most vulnerable vectors targeted by cybercriminals. The cyber-attacks are likely to happen to organizations that have yet to implement strong email security controls and best practices.

    “Due to the ubiquity of email, it continues to be a common attack vector for cybercriminals seeking to steal login credentials, money, and sensitive data.” Said Rajesh Maurya, Regional Vice President, India & SAARC, Fortinet. “The top email-based cyberattacks carried out by cybercriminals today include phishing or spear-phishing, man-in-the-middle attacks and zero-day vulnerabilities. Companies must therefore ensure they have strong security controls in place to detect and prevent these e-mail attacks.”

    To help ensure email security, Fortinet’s cybersecurity experts advised users to:

    1. Filter Spam: Because most email scams begin with unsolicited commercial email, one should take measures to prevent spam from getting into the mailbox. Most email applications and web mail services include spam-filtering features, or ways in which email applications can be configured to filter spam.
    2. Regard Unsolicited Email with Suspicion: Don’t automatically trust any email sent by an unknown individual or organization. Never open an attachment to unsolicited email. Most importantly, never click on an unknown link in an email. Cleverly crafted links can take users to forged web sites set up to trick them into divulging private information or downloading viruses, spyware, and other malicious software.
    3. Treat Email Attachments with Caution: Email attachments are commonly used by online scammers to sneak a virus onto computers. These viruses can help the scammer steal important information from the computer, compromising the computer so that it is open to further attack and abuse, and convert a computer into a ‘bot’ for use in denial-of-service attacks and other online crimes. As noted above, a familiar “from” address is no guarantee of safety because some viruses spread by first searching for all email addresses on an infected computer and then sending itself to these addresses.
    4. Install Antivirus Software: Users should install an antivirus program that has an automatic update feature. This will help ensure users to always have the most up-to-date protection possible against viruses.

    5. Install a Personal Firewall and Keep it Up to Date: A firewall will not prevent scam email from making its way into users’ mailbox. However, it may help protect users       should they inadvertently open a virus-bearing attachment or otherwise introduce malware to their computer. The firewall, among other things, will help prevent outbound traffic from a user’s computer to the attacker. When a personal firewall detects suspicious outbound communications from a user’s computer, it could be a sign that the user has  inadvertently installed malicious programs on his computer.

    ELE Times Research Desk
    ELE Times Research Deskhttps://www.eletimes.ai
    ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.

    LEAVE A REPLY

    Please enter your comment!
    Please enter your name here

    Related News

    Must Read

    Optimized analog front-end design for edge AI

    Courtesy: Avnet Key Takeaways: 01.   AI models see data differently: what...

    Introducing Wi-Fi 8: The Next Boost for the Wireless AI Edge

    Courtesy: Broadcom Wi-Fi 8 has officially arrived—and it marks a...

    Vehicle to Grid (V2G) Charging in EVs: Understanding the Basics

    Much of the research around emerging technologies in Electric...

    Asia-Pacific Takes the Lead in AI Adoption Across Manufacturing

    Courtesy: Rockwell Automation Manufacturing around the world has undergone a...

    STMicroelectronics streamlines smart-home device integration with industry-first Matter NFC chip

    STMicroelectronics has unveiled a secure NFC chip designed to...

    Mitsubishi Electric India to Showcase Breakthrough Power Semiconductor Technologies at PCIM India 2025

    Mitsubishi Electric India, is set to introduce its flagship...

    ASMPT Wins New Orders for Nineteen Chip-to-Substrate TCB Tools to Serve AI Chip Market

    ASMPT announced it had won new orders for 19...

    Microchip Halves the Power Required to Measure How Much Power Portable Devices Consume

    Battery-operated devices and energy-restricted applications must track and monitor...