top of page

WHALING ATTACK

Updated: Apr 13


man dancing with headphones on

Whaling Attack:

Not your momma's attempt at lesson teaching, this maritime-inspired techie homophone will catch decision-makers by the worst surprise. Targeting C-suite and high-level end users, sneaky cybercriminals use carefully crafted emails to reel in a company's "big phish,"gaining insider access to company jewels. An offshoot of the well-known "phishing" attack, whaling is insidious and calculated deceit, with the end goal of exploiting business leaders' personal devices. And unless execs know what to look for, they can easily be duped. This is no casual spam scam—attackers research correct titles, company information, even personal details in an effort to sound legit. Social media can play a huge part in the harvest, and along with being judicious in detail sharing, experts recommend quizzes and social pen-testing to expose vulnerabilities. Those in the know also predict that in the coming year, execs will need to be ever more vigilant if they hope to evade the hunters. Sounds like it’s time to drop anchor and chart a new course—toward protection.

Be the first to know when we post a new blog! Sign up below and get an email in your inbox every time a new blog goes live. We typically post twice a month - no spam, we promise.

Cozy reading corner to explore the Zinc blog.

This blog post does not provide insurance advice and is intended for information purposes only. It is not a substitute for professional insurance advice from a licensed representative. Never ignore professional insurance advice because of something you have read in this blog post. Contact your licensed representative if you have any questions about your insurance policy.

bottom of page