A manufacturing organization has experienced repeated attempts by outsiders impersonating internal users through email messages. Which action supports staff readiness to handle these attempts?
Add encryption to inbound messages to safeguard data in transit
Extend the data retention timeframe for email logs to preserve historical records
Designate a contact in the IT department responsible for investigating suspicious messages
Provide regular education sessions that cover how to identify unusual messages and notify designated staff
Providing regular education sessions strengthens employee vigilance and skills to detect unusual messages. The other options involve technical measures or selective oversight without improving overall staff awareness or response competency.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is employee education important in preventing email-based impersonation attacks?
Open an interactive chat with Bash
What are common signs of unusual or suspicious email messages?
Open an interactive chat with Bash
How can reporting suspicious messages benefit an organization’s security posture?