Phishing explained

We've all received text messages like "Please verify your login or your account will be suspended" or promises that you've won a prize. Don't fall for it! In this video, security expert Jeff Crume explains the attackers' strategy, whether it's phishing, spearfishing or whaling -- and how to avoid falling for their traps.

Featured resource Get insights to better manage the risk of a data breach Get the Cost of a Data Breach Report 2024 for the most up-to-date insights into the evolving cybersecurity threat landscape. Learn more

Strengthen your security intelligence

 

Stay ahead of threats with news and insights on security, AI and more, weekly in the Think Newsletter.

Subscribe today
You might like Explore all Think videos AI Academy

Watch AI Academy, a new flagship AI for business educational experience. Gain insights from top IBM thought leaders on effectively prioritizing the AI investments that can drive growth, through a course designed for business leaders like you.

Explore the curriculum
IBM Think 2024 on demand

Watch the Think 2024 keynote replays of the top business and tech minds and learn how to scale AI across your enterprise.

Watch the replays
Rethink use cases

IBM’s animated series shows how you can transform customer service, app modernization, HR and marketing with generative AI. Each episode features an IBM expert imagining the application of AI to a workflow, and the impact on an entire enterprise.

Watch now
How IBM can help
IBM Security solutions

IBM Security develops intelligent enterprise security solutions and services to help your business prepare today for the cybersecurity threats of tomorrow.

Transform your security program
Cybersecurity services

Transform your business and manage risk with a global industry leader in cybersecurity consulting, cloud and managed security services.

Explore services
IBM Security Guardium

Uncover vulnerabilities and protect sensitive on-premises and cloud data. IBM Security Guardium is a data security solution that can adapt as the threat environment changes, providing complete visibility, compliance and protection throughout the data security lifecycle.

Get started with IBM Security Guardium