Here at New River Computing, we like to share interesting infographics as we come across them. Our main goal is to try and disseminate intricate IT related information quickly and clearly, to as many users as possible.
This particular one from AVNET's Behind the Firewall deals with Phishing Attacks. And offers the following five recommendations
Determine who the real sender is.
Check the salutation.
Use you mouse hover to check links before clicking.