{"id":399,"date":"2023-07-06T14:15:46","date_gmt":"2023-07-06T18:15:46","guid":{"rendered":"https:\/\/adrienneharris.tech\/?p=399"},"modified":"2024-11-28T23:23:40","modified_gmt":"2024-11-29T04:23:40","slug":"infosec-awareness-mailer-executive","status":"publish","type":"post","link":"https:\/\/adrienneharris.tech\/index.php\/2023\/07\/06\/infosec-awareness-mailer-executive\/","title":{"rendered":"Project: InfoSec Awareness Mailer \u2013> Executive"},"content":{"rendered":"\n<p>Below is an example of Just-In-Time cybersecurity awareness content for emerging threats to reduce operational risk to tailored audiences. <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>TO: Guice Wealth Executive Team<\/p>\n\n\n\n<p>FROM: Security &amp; Compliance Officer<\/p>\n\n\n\n<p>SUBJECT: Business Email Compromise <\/p>\n\n\n\n<p>BODY: <\/p>\n\n\n\n<p>Business Email Compromise, or <a rel=\"noreferrer noopener\" href=\"https:\/\/www.csoonline.com\/article\/575383\/microsoft-reports-jump-in-business-email-compromise-activity.html#tk.rss_all\" target=\"_blank\">BEC<\/a>, can bring a company to its knees. I found this FBI <a rel=\"noreferrer noopener\" href=\"https:\/\/www.fbi.gov\/how-we-can-help-you\/safety-resources\/scams-and-safety\/common-scams-and-crimes\/business-email-compromise\" target=\"_blank\">resource<\/a> in addition to the short video below on how to keep attackers at bay.\u00a0<\/p>\n\n\n\n<p>Thanks and have a wonderful day!<\/p>\n\n\n\n<p>Information Security and Compliance Department<\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/www.loom.com\/share\/d6f9b5dff65446069f9784b935488fd5?sid=a3336f5c-dc3f-4746-8446-d1dd7997ae71\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/adrienneharris.tech\/wp-content\/uploads\/2023\/07\/Screen-Shot-2023-07-06-at-14.11.31-1024x640.png\" alt=\"\" class=\"wp-image-439\" width=\"326\" height=\"204\" srcset=\"https:\/\/adrienneharris.tech\/wp-content\/uploads\/2023\/07\/Screen-Shot-2023-07-06-at-14.11.31-1024x640.png 1024w, https:\/\/adrienneharris.tech\/wp-content\/uploads\/2023\/07\/Screen-Shot-2023-07-06-at-14.11.31-300x188.png 300w, https:\/\/adrienneharris.tech\/wp-content\/uploads\/2023\/07\/Screen-Shot-2023-07-06-at-14.11.31-768x480.png 768w, https:\/\/adrienneharris.tech\/wp-content\/uploads\/2023\/07\/Screen-Shot-2023-07-06-at-14.11.31.png 1440w\" sizes=\"auto, (max-width: 326px) 100vw, 326px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<div class=\"entry-summary\">\nBelow is an example of Just-In-Time cybersecurity awareness content for emerging threats to reduce operational risk to tailored audiences. TO: Guice Wealth Executive Team FROM: Security &amp; Compliance Officer SUBJECT: Business Email Compromise BODY: Business Email Compromise, or BEC, can bring a company to its knees. I found this FBI resource in addition to the&hellip;\n<\/div>\n<div class=\"link-more\"><a href=\"https:\/\/adrienneharris.tech\/index.php\/2023\/07\/06\/infosec-awareness-mailer-executive\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &ldquo;Project: InfoSec Awareness Mailer \u2013> Executive&rdquo;<\/span>&hellip;<\/a><\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-399","post","type-post","status-publish","format-standard","hentry","category-uncategorised","entry"],"acf":[],"_links":{"self":[{"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/posts\/399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/comments?post=399"}],"version-history":[{"count":11,"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/posts\/399\/revisions"}],"predecessor-version":[{"id":836,"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/posts\/399\/revisions\/836"}],"wp:attachment":[{"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/media?parent=399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/categories?post=399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/tags?post=399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}