Phishing Guidance Stopping the Attack Cycle at Phase One CISA
pAn official website of the United States governmentppHeres how you knowpp
Official websites use gov
A gov website belongs to an official government organization in the United States
pp
Secure gov websites use HTTPS
A lock LockA locked padlock or https means youve safely connected to the gov website Share sensitive information only on official secure websites
ppSearchppThis guide was created by the Cybersecurity and Infrastructure Security Agency CISA National Security Agency NSA Federal Bureau of Investigation FBI and MultiState Information Sharing and Analysis Center MSISAC to outline phishing techniques malicious actors commonly use and to provide guidance for both network defenders and software manufacturers Phishing Guidance Stopping the Attack Cycle at Phase One contains guidance for network defenders applicable to all organizations and for software manufacturers that focuses on securebydesign and default tactics and techniques Additionally the guide contains a section tailored for small and mediumsized businesses to aid in protecting their cyber resources from evolving phishing threatsp
Official websites use gov
A gov website belongs to an official government organization in the United States
pp
Secure gov websites use HTTPS
A lock LockA locked padlock or https means youve safely connected to the gov website Share sensitive information only on official secure websites
ppSearchppThis guide was created by the Cybersecurity and Infrastructure Security Agency CISA National Security Agency NSA Federal Bureau of Investigation FBI and MultiState Information Sharing and Analysis Center MSISAC to outline phishing techniques malicious actors commonly use and to provide guidance for both network defenders and software manufacturers Phishing Guidance Stopping the Attack Cycle at Phase One contains guidance for network defenders applicable to all organizations and for software manufacturers that focuses on securebydesign and default tactics and techniques Additionally the guide contains a section tailored for small and mediumsized businesses to aid in protecting their cyber resources from evolving phishing threatsp