Security Behaviour Database
/
All Behaviours > Verifying messages

Verifying messages

Contact details can be spoofed. Receiving a message that breaks any norms should be met with suspicion. Using known contact details to check the request helps to determine if it is legitimate or not.


Why is it important?

Attackers will attempt to impersonate people who are trusted. Their impersonation may not always be accurate.

Checking if a person is legitimate if there is any suspicion can prevent confidential or sensitive information being disclosed.

Priority Tier

Behaviours in SebDB are ranked by their impact on risk. Tier 1 behaviours have the biggest impact, Tier 4 behaviours the least.

Tier 1

Risk Mitigated

Malware Infection

Malware Infection

Malware infections occur when malicious software makes its way on to a device or network.

Data Theft

Data Theft

Data theft is the intentional stealing of data.

Personal Exposure

Personal Exposure

Personal exposure is the extent to how much someones personal information is available online.

Further reading

https://www.us-cert.gov/ncas/tips/ST04-014 https://www.us-cert.gov/ncas/tips/ST04-010 https://kilthub.cmu.edu/articles/Behavioral_Response_to_Phishing_Risk/6621248/files/12117656.pdf

SebDB is brought to you byCybSafe| © 2022 CybSafe Ltd