<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Link Archives - L2 Cyber Security Solutions</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/link/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/link/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 15:13:41 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Link Archives - L2 Cyber Security Solutions</title>
	<link>https://www.l2cybersecurity.com/tag/link/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 091 Phishing for Credentials</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-091-phishing-for-credentials/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 20 Aug 2021 07:15:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Credential Phishing]]></category>
		<category><![CDATA[Credentials]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Google Account Login]]></category>
		<category><![CDATA[Google Drive]]></category>
		<category><![CDATA[Google Drive Link]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[Microsoft Account Login]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Phishing for Credentials]]></category>
		<category><![CDATA[SharePoint]]></category>
		<category><![CDATA[SharePoint Link]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2588</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 91. This week we&#8217;re going to talk about phishing for credentials. This sounds familiar I covered something pretty similar back in #WeekendWisdom number 42 where I covered Consent Phishing. But credential phishing is where the criminals are going to try and get you to give up your login ID, usually your&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-091-phishing-for-credentials/">#WeekendWisdom 091 Phishing for Credentials</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 91. This week we&#8217;re going to talk about phishing for credentials.<span id="more-2588"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2588-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-091-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-091-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-091-lo.mp4</a></video></div>
<h3>This sounds familiar</h3>
<p>I covered something pretty similar back in <a href="https://www.l2cybersecurity.com/weekendwisdom-042-consent-phishing/" target="_blank" rel="noopener">#WeekendWisdom number 42</a> where I covered Consent Phishing.</p>
<p>But credential phishing is where the criminals are going to try and get you to give up your login ID, usually your email address and your password. They can later on compromise your email account or perhaps log into your office systems to be able to execute a ransomware attack.</p>
<h3>How do they carry out phishing for credentials?</h3>
<p>The methods they use are varied, but a very sneaky one that they typically use is, they will send an email with an actual SharePoint link in there, or this could be a Google Drive link as well. People are very familiar with SharePoint links and Google drive links. They are usually fairly safe to click because these are things that people deal with on a day-to-day basis. They&#8217;re not some crazy dodgy site that you are being linked to. It&#8217;s something you&#8217;re familiar with.</p>
<p>Then when you click on the link, then it will say &#8220;Oh. You need to sign into your Microsoft account&#8221; or &#8220;&#8230; your Google account to be able to get into this document.&#8221; That&#8217;s where they catch you. They pop-up a login page and you give up your user ID and password in there. Now they have it.</p>
<h3>How can you protect yourself from this?</h3>
<p>So it&#8217;s really important that you implement something like multi-factor authentication to get an additional set of protections from these sorts of attacks.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-091-phishing-for-credentials/">#WeekendWisdom 091 Phishing for Credentials</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-091-lo.mp4" length="31363196" type="video/mp4" />

			</item>
	</channel>
</rss>
