{"id":1221,"date":"2022-11-09T13:13:26","date_gmt":"2022-11-09T13:13:26","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1221"},"modified":"2022-11-09T13:13:26","modified_gmt":"2022-11-09T13:13:26","slug":"%eb%b9%84%ec%a6%88%eb%8b%88%ec%8a%a4%eb%a5%bc-%ec%9d%b4%eb%a9%94%ec%9d%bc-%ed%94%bc%ec%8b%b1-%ea%b3%b5%ea%b2%a9%ec%9c%bc%eb%a1%9c%eb%b6%80%ed%84%b0-%eb%b3%b4%ed%98%b8%ed%95%98%eb%8a%94-%eb%b0%a9","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%ec%82%ac%ec%9d%b4%eb%b2%84-%ea%b3%b5%ea%b2%a9\/%eb%b9%84%ec%a6%88%eb%8b%88%ec%8a%a4%eb%a5%bc-%ec%9d%b4%eb%a9%94%ec%9d%bc-%ed%94%bc%ec%8b%b1-%ea%b3%b5%ea%b2%a9%ec%9c%bc%eb%a1%9c%eb%b6%80%ed%84%b0-%eb%b3%b4%ed%98%b8%ed%95%98%eb%8a%94-%eb%b0%a9\/","title":{"rendered":"\uc0ac\uc774\ubc84 \ubc94\uc8c4\ub294 \uc774\uc81c \uae30\uc5c5\uc774 \ub9e4\uc77c \uc9c1\uba74\ud558\ub294 \ub9ce\uc740 \ubb38\uc81c \uc911 \ud558\ub098\uc785\ub2c8\ub2e4. \uae30\uc220\uc740 \ub9ce\uc740 \ud68c\uc0ac\uc758 \ubc1c\uc804\uc758 \uc8fc\ucd95\uc774 \ub418\uc5b4 \uc654\uc73c\uba70, \ub514\uc9c0\ud138 \uce21\uba74\uc774 \ub354\uc6b1 \ud544\uc218\uc801\uc774 \ub418\uba74\uc11c\u2026"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">\uc0ac\uc774\ubc84 \ubc94\uc8c4\ub294 \uc774\uc81c \uae30\uc5c5\uc774 \ub9e4\uc77c \uc9c1\uba74\ud558\ub294 \ub9ce\uc740 \uc6b0\ub824 \uc911 \ud558\ub098\uc785\ub2c8\ub2e4. \uae30\uc220\uc740 \ub9ce\uc740 \ud68c\uc0ac\uc758 \ubc1c\uc804\uc758 \uc8fc\ucd95\uc774 \ub418\uc5b4 \uc654\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ub514\uc9c0\ud138 \uce21\uba74\uc774 \ube44\uc988\ub2c8\uc2a4 \uc6b4\uc601\uacfc \uc77c\uc0c1 \ud65c\ub3d9\uc5d0 \ub354 \ud544\uc218\uc801\uc774 \ub428\uc5d0 \ub530\ub77c \uc774 \ud658\uacbd\uc5d0\uc11c\uc758 \uacf5\uaca9 \uc99d\uac00\ub3c4 \ub9c8\ucc2c\uac00\uc9c0\uc785\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the most common means for hackers to gain access to the private information of individuals and companies is through email. E-mail is one of the most used channels by companies and individuals to share information on a daily basis. It\u2019s incredible how much information is sent through email every day and how much of that data contains private or delicate information. Suppose you want to prevent your company from suffering a phishing attack due to an oversight in the correct use of email. In that case, this article will provide you with valuable information to prevent and provide greater security to your company.\u00a0<\/span><\/p>\n<h2><b>\uba3c\uc800, \ud53c\uc2f1\uc774\ub780 \ubb34\uc5c7\uc785\ub2c8\uae4c?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Phishing is a type of social engineering where the hacker tricks a user into doing \u201cthe wrong thing\u201d, which usually includes disclosing information or clicking on a malicious link. Phishing can be conducted via social media, text messages, or even by phone. However, nowadays, emails have been the most common channel for perpetuating this type of attack. Email is an ideal delivery method for phishing attacks because most people check their emails in a rushed manner. In addition, these malicious emails are very easy to camouflage among legitimate emails.<\/span><\/p>\n<h3><b>\ud53c\uc2f1\uc774 \ube44\uc988\ub2c8\uc2a4\uc5d0 \uc5b4\ub5a4 \uc601\ud5a5\uc744 \ubbf8\uce69\ub2c8\uae4c?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\ubaa8\ub4e0 \uc720\ud615\uacfc \uaddc\ubaa8\uc758 \uc870\uc9c1\uc740 \ud53c\uc2f1 \uc774\uba54\uc77c\uc5d0 \uc758\ud574 \ud0c0\uaca9\uc744 \ubc1b\uc744 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc815\ubcf4 \ub3c4\ub09c \uc678\uc5d0\ub3c4 \ud53c\uc2f1 \uc774\uba54\uc77c\uc740 \ub79c\uc12c\uc6e8\uc5b4\ub97c \ud3ec\ud568\ud55c \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub97c \uc124\uce58\ud558\uc5ec \uc2dc\uc2a4\ud15c\uc744 \ud30c\uad34\ud558\uac70\ub098 \uc0ac\uae30\ub97c \ud1b5\ud574 \ub3c8\uc744 \ud6d4\uce60 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub610\ud55c \uc0ac\uc774\ubc84 \uacf5\uaca9\uc740 \uadc0\ud558\uc758 \ud3c9\ud310\uacfc \uace0\uac1d\uc758 \uc2e0\ub8b0\ub97c \ud30c\uad34\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub300\uaddc\ubaa8 \ucea0\ud398\uc778\uc5d0 \ud718\ub9d0\ub9b4 \uc218\ub3c4 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub294 \uacf5\uaca9\uc790\uac00 \ube44\ubc00\ubc88\ud638\ub97c \ud6d4\uce58\uac70\ub098 \uc27d\uac8c \ub3c8\uc744 \ubc84\ub294 \uacbd\uc6b0\ub85c, \uc774\ub294 \uc77c\ubc18\uc801\uc73c\ub85c \ud68c\uc0ac\uc5d0 \ub300\ud55c \ub354 \ud070 \uacf5\uaca9\uc744 \uc800\uc9c0\ub974\uae30 \uc704\ud55c \uccab \ubc88\uc9f8 \ub2e8\uacc4\uc785\ub2c8\ub2e4. \ud45c\uc801 \ucea0\ud398\uc778\uc5d0\uc11c\ub294 \uacf5\uaca9\uc790\uac00 \uadc0\ud558\uc758 \uc9c1\uc6d0\uc5d0 \ub300\ud55c \uac1c\uc778 \uc815\ubcf4\ub97c \uc0ac\uc6a9\ud558\uc5ec \ub354 \ud604\uc2e4\uc801\uc774\uace0 \uc124\ub4dd\ub825 \uc788\ub294 \uba54\uc2dc\uc9c0\ub97c \ub9cc\ub4e4 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub97c \uc2a4\ud53c\uc5b4 \ud53c\uc2f1\uc774\ub77c\uace0 \ud569\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>\ud53c\uc2f1 \uacf5\uaca9\uc774 \uc131\uacf5\uc801\uc778 \uc774\uc720\ub294 \ubb34\uc5c7\uc785\ub2c8\uae4c?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Hackers have studied people\u2019s online behavior very well, they know how people\u2019s social instincts works, such as being helpful and efficient. Phishing attacks can be particularly powerful because these social instincts also make us good at our jobs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ud53c\uc2f1 \uacf5\uaca9\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\ub294 \uac00\uc7a5 \ud6a8\uacfc\uc801\uc778 \ubc29\ubc95\uc740 \uae30\uc220, \ud504\ub85c\uc138\uc2a4 \ubc0f \uc0ac\ub78c \uae30\ubc18 \uc811\uadfc \ubc29\uc2dd\uc744 \uacb0\ud569\ud558\uc5ec \ud65c\uc6a9\ud558\ub294 \uac83\uc785\ub2c8\ub2e4. \uc608\ub97c \ub4e4\uc5b4, \uc0ac\ub78c\ub4e4\uc774 \uc758\uc2ec\uc2a4\ub7ec\uc6b4 \uc774\uba54\uc77c\uc744 \ubcf4\uace0\ud558\ub3c4\ub85d \ud558\ub824\uba74 \uadf8\ub807\uac8c \ud558\uae30 \uc27d\uac8c \ub9cc\ub4e4\uc5b4\uc57c \ud569\ub2c8\ub2e4. \uc774\ub294 \uc774\uba54\uc77c \ubcf4\uace0\ub97c \uc704\ud55c \uae30\uc220\uc801 \uc218\ub2e8\uc744 \uc81c\uacf5\ud558\uace0 \ubcf4\uace0\uc5d0 \ub300\ud55c \uc801\uc2dc \ud53c\ub4dc\ubc31\uc744 \uc81c\uacf5\ud558\ub294 \ud504\ub85c\uc138\uc2a4\ub97c \uac16\ucd94\ub294 \uac83\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4.<\/span><\/p>\n<h2><b>\ud53c\uc2f1 \uacf5\uaca9\uc73c\ub85c\ubd80\ud130 \ube44\uc988\ub2c8\uc2a4\ub97c \ubcf4\ud638\ud558\ub294 \ubc29\ubc95\uc740 \ubb34\uc5c7\uc785\ub2c8\uae4c?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\uc774\uba54\uc77c \ud53c\uc2f1 \uacf5\uaca9\uc73c\ub85c\ubd80\ud130 \ud68c\uc0ac\ub97c \ubcf4\ud638\ud558\uae30 \uc704\ud55c \uc804\ubb38\uac00 \uc81c\uacf5 \ub2e8\uacc4\ub294 \ub2e4\uc74c\uacfc \uac19\uc2b5\ub2c8\ub2e4:<\/span><\/p>\n<h3><b>\ubc29\uc5b4\ub97c \ud655\uc7a5\ud558\uae30:<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Typical defences against phishing rely on users\u2019 ability to detect phishing emails. By widening your defences you can improve your resilience against phishing without disrupting the productivity of your employees. You will also have multiple opportunities to detect a phishing attack and act before it can cause big damage to your company. Also, it is essential to embrace the fact that some attacks will get through, which you can use as an advantage to plan ahead and minimise the damage caused.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ubcf4\uc548 \uacc4\ud68d\uc744 \uac1c\ubc1c\ud560 \ub54c \ubc29\uc5b4\ub97c \ub124 \uac00\uc9c0 \uacc4\uce35\uc73c\ub85c \uc0dd\uac01\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Don\u2019t let your email addresses be a resource for hackers.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\uc0ac\uc6a9\uc790\uc5d0\uac8c \uc7a0\uc7ac\uc801\uc73c\ub85c \ud574\ub85c\uc6b4 \ub610\ub294 \uc0ac\uae30\uc131 \uc774\uba54\uc77c\uc744 \uc2dd\ubcc4\ud558\uace0 \ubcf4\uace0\ud558\ub3c4\ub85d \ub3d5\uc2b5\ub2c8\ub2e4.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\ud0d0\uc9c0\ub418\uc9c0 \uc54a\uc740 \ud53c\uc2f1 \uc774\uba54\uc77c\ub85c\ubd80\ud130 \uc870\uc9c1\uc744 \uc548\uc804\ud558\uac8c \uc720\uc9c0\ud558\uc2ed\uc2dc\uc624.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\uc0ac\uac74\uc744 \uc2e0\uc18d\ud558\uac8c \ud574\uacb0\ud558\uae30 \uc704\ud574 \uc2e0\uc18d\ud558\uac8c \ub300\uc751\ud558\ub294 \uac83\uc774 \uc911\uc694\ud569\ub2c8\ub2e4.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">\uc544\ub798\uc5d0\uc11c \uc774\ub7ec\ud55c \uac01 \uacc4\uce35\uacfc \uc774\ub97c \ube44\uc988\ub2c8\uc2a4\uc5d0 \uc801\uc6a9\ud558\ub294 \ubc29\ubc95\uc744 \uc124\uba85\ud569\ub2c8\ub2e4.\u00a0<\/span><\/p>\n<h2><b>\uacc4\uce35 1: \ud574\ucee4\uac00 \uc0ac\uc6a9\uc790\uc5d0\uac8c \uc811\uadfc\ud558\uae30 \uc5b4\ub835\uac8c \ub9cc\ub4dc\uc2ed\uc2dc\uc624<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\uccab \ubc88\uc9f8 \uacc4\uce35\uc740 \ud574\ucee4\uac00 \ucd5c\uc885 \uc0ac\uc6a9\uc790\uc5d0\uac8c \uc811\uadfc\ud558\uae30 \uc5b4\ub835\uac8c \ub9cc\ub4e4 \uc218 \uc788\ub294 \ubc29\uc5b4\ub97c \uc124\uba85\ud569\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>Don\u2019t let hackers use your email addresses as a resource<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\uacf5\uaca9\uc790\ub294 \uadc0\ud558\uc758 \uc9c1\uc6d0 \uc911 \ud55c \uba85 \ub610\ub294 \uc2ec\uc9c0\uc5b4 \uadc0\ud558 \uc790\uc2e0\uc778 \ucc99\ud558\ub294 \uc774\uba54\uc77c\uc744 \ubcf4\ub0b4 \uc0ac\ub78c\ub4e4\uc744 \uc18d\uc77c \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uc2a4\ud478\ud551\ub41c \uc774\uba54\uc77c\uc740 \uadc0\ud558\uc758 \uace0\uac1d\uc774\ub098 \uc870\uc9c1 \ub0b4\ubd80 \uc0ac\ub78c\ub4e4\uc5d0\uac8c \ub3c4\ub2ec\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><strong>\uc774\ub97c \ubc29\uc9c0\ud558\ub824\uba74 \uc5b4\ub5bb\uac8c \ud574\uc57c \ud569\ub2c8\uae4c?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">\uc774\uba54\uc77c \uc8fc\uc18c\ub97c \ubcf4\ud638\ud558\uace0 \ud574\ucee4\uac00 \uc811\uadfc\ud558\uc9c0 \ubabb\ud558\ub3c4\ub85d \ubc29\uc9c0\ud558\ub824\uba74 DMARC, SPF \ubc0f DKIM\uacfc \uac19\uc740 \uc548\ud2f0 \uc2a4\ud478\ud551 \uc81c\uc5b4\ub97c \uc0ac\uc6a9\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub610\ud55c \uadc0\ud558\uc758 \uc5f0\ub77d\ucc98\uac00 \ub3d9\uc77c\ud55c \uc870\uce58\ub97c \ucde8\ud558\ub3c4\ub85d \uad8c\uc7a5\ud558\ub294 \uac83\ub3c4 \ub9e4\uc6b0 \uc720\uc6a9\ud569\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>\uc628\ub77c\uc778\uc5d0\uc11c \uc0ac\uc6a9\ud560 \uc218 \uc788\ub294 \uc815\ubcf4\ub97c \uc904\uc774\uc2ed\uc2dc\uc624<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The online public information of your company is known as a \u201cdigital footprint\u201d and includes all the public information you post on social media and your website. Including the one your employee posted.<\/span><\/p>\n<p><strong>\uc774\uc5d0 \ub300\ud574 \ubb34\uc5c7\uc744 \ud560 \uc218 \uc788\uc2b5\ub2c8\uae4c?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Don\u2019t provide unnecessary details; beware of the information your partners, contractors, and suppliers give about you in their organization\u2019s online communication and work with your employees to minimize security risks. Educate your staff on how sharing their personal information can affect them and the organization, and develop a clean digital footprint policy for all users.<\/span><\/p>\n<h3><b>\ub4e4\uc5b4\uc624\ub294 \ud53c\uc2f1 \uc774\uba54\uc77c\uc744 \ud544\ud130\ub9c1\ud558\uac70\ub098 \ucc28\ub2e8\ud558\uc2ed\uc2dc\uc624<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\ud53c\uc2f1 \uacf5\uaca9 \uc2dc\ub3c4\ub97c \uc0ac\uc6a9\uc790\uac00 \ubc1b\uae30 \uc804\uc5d0 \ud544\ud130\ub9c1\ud558\uac70\ub098 \ucc28\ub2e8\ud558\uba74 \ud53c\ud574 \uac00\ub2a5\uc131\uc744 \uc904\uc77c \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub610\ud55c \uc0ac\uc6a9\uc790\uac00 \uc758\uc2ec\uc2a4\ub7ec\uc6b4 \uc774\uba54\uc77c\uc744 \ud655\uc778\ud558\uace0 \ubcf4\uace0\ud558\ub294 \ub370 \ud544\uc694\ud55c \uc2dc\uac04\uc744 \uc904\uc77c \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><strong>\uc774\ub97c \uc5b4\ub5bb\uac8c \ud560 \uc218 \uc788\uc2b5\ub2c8\uae4c?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">\ud074\ub77c\uc6b0\ub4dc \uae30\ubc18 \ud544\ud130\ub9c1\/\ucc28\ub2e8 \uc11c\ube44\uc2a4\ub97c \ud68d\ub4dd\ud558\uc5ec \ud53c\uc2f1 \ubc0f \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uac00 \ud3ec\ud568\ub41c \ubaa8\ub4e0 \ub4e4\uc5b4\uc624\ub294 \uc774\uba54\uc77c\uc744 \uc0ac\uc6a9\uc790\uac00 \ubc1b\uae30 \uc804\uc5d0 \ucc28\ub2e8\ud558\uc2ed\uc2dc\uc624. \uc5bb\uc740 \uc11c\ube44\uc2a4\uac00 \ubaa8\ub4e0 \uc0ac\uc6a9\uc790\ub97c \ud3ec\uad04\ud558\ub294\uc9c0 \ud655\uc778\ud558\uc2ed\uc2dc\uc624. \uc218\uc2e0 \uc774\uba54\uc77c\uc758 \uacbd\uc6b0 \ubc1c\uc2e0\uc790\uc758 \uc548\ud2f0 \uc2a4\ud478\ud551 \uc815\ucc45\uc744 \uc900\uc218\ud574\uc57c \ud569\ub2c8\ub2e4. \ubc1c\uc2e0\uc790\uac00 \uac70\ubd80 \uc815\ucc45\uc774 \uc788\ub294 DMARC \uc815\ucc45\uc744 \uac00\uc9c0\uace0 \uc788\ub294 \uacbd\uc6b0 \uc694\uccad\ub300\ub85c \uc218\ud589\ud574\uc57c \ud569\ub2c8\ub2e4. \ub610\ud55c \uc774\uba54\uc77c\uc740 IP \uc8fc\uc18c, \ub3c4\uba54\uc778 \uc774\ub984, \uc774\uba54\uc77c \uc8fc\uc18c \ud654\uc774\ud2b8\/\ube14\ub799\ub9ac\uc2a4\ud2b8, \uacf5\uacf5 \uc2a4\ud338 \ubc0f \uc624\ud508 \ub9b4\ub808\uc774 \ube14\ub799\ub9ac\uc2a4\ud2b8, \ucca8\ubd80 \ud30c\uc77c \uc720\ud615 \ubc0f \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \ud0d0\uc9c0\uc640 \uac19\uc740 \uc5ec\ub7ec \ubc29\ubc95\uc73c\ub85c \ud544\ud130\ub9c1\ud558\uac70\ub098 \ucc28\ub2e8\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<h2><b>\uacc4\uce35 2: \uc0ac\uc6a9\uc790\uac00 \uc758\uc2ec\uc2a4\ub7ec\uc6b4 \ud53c\uc2f1 \uc774\uba54\uc77c\uc744 \uc2dd\ubcc4\ud558\uace0 \ubcf4\uace0\ud558\ub3c4\ub85d \ub3d5\uc2b5\ub2c8\ub2e4<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\uc774 \uacc4\uce35\uc740 \uc9c1\uc6d0\uc774 \ud53c\uc2f1 \uc774\uba54\uc77c\uc744 \uc2dd\ubcc4\ud558\ub294 \ub370 \ub3c4\uc6c0\uc744 \uc8fc\uace0 \ubcf4\uace0 \ubb38\ud654\ub97c \uac1c\uc120\ud558\ub294 \uac00\uc7a5 \uc88b\uc740 \ubc29\ubc95\uc744 \uc124\uba85\ud569\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>\uc798 \uc2e4\ud589\ub41c \ud53c\uc2f1 \uad50\uc721 \ud504\ub85c\uadf8\ub7a8\uc740 \ucc28\uc774\ub97c \ub9cc\ub4e4 \uc218 \uc788\uc2b5\ub2c8\ub2e4<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One of the most emphasized methods regarding phishing defence is your train your users, they can provide a valuable contribution to your organization\u2019s safety. However, humans can make mistakes, that\u2019s why it is crucial to provide a holistic approach with appropriate technical mitigations and changes to the wider security culture of the organization.\u00a0<\/span><\/p>\n<p><strong>\uc774\ub97c \uc5b4\ub5bb\uac8c \ud560 \uc218 \uc788\uc2b5\ub2c8\uae4c?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">\uc9c1\uc6d0\ub4e4\uc740 \ud53c\uc2f1 \uba54\uc2dc\uc9c0\ub97c \uc2dd\ubcc4\ud558\uae30 \uc5b4\ub824\uc6b8 \uc218 \uc788\uc73c\uba70 \ud56d\uc0c1 \uc2dd\ubcc4\ud560 \uac83\uc744 \uae30\ub300\ud558\uc9c0 \uc54a\ub294\ub2e4\ub294 \uac83\uc744 \uc54c\uc544\uc57c \ud569\ub2c8\ub2e4. \ub300\uc2e0, \ubb34\uc5b8\uac00 \uc774\uc0c1\ud574 \ubcf4\uc77c \ub54c \uc9c0\uce68\uc774\ub098 \uc9c0\uc6d0\uc744 \uc694\uccad\ud558\ub294 \uac83\uc774 \uad1c\ucc2e\ub2e4\ub294 \uc0ac\uace0\ubc29\uc2dd\uc744 \uc870\uc131\ud558\uc2ed\uc2dc\uc624.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ud53c\uc2f1 \uc774\uba54\uc77c\uc744 \uc2dd\ubcc4\ud558\ub294 \ub370 \uc5b4\ub824\uc6c0\uc744 \uacaa\uace0 \uc788\ub294 \uc0ac\uc6a9\uc790\ub97c \uc808\ub300 \ucc98\ubc8c\ud558\uc9c0 \ub9c8\uc2ed\uc2dc\uc624. \ud574\ucee4\ub294 \uc804\ubb38\uac00\uc774\uba70 \uc0ac\ub78c\ub4e4\uc744 \uc18d\uc774\ub294 \ubc29\ubc95\uc744 \uc54c\uace0 \uc788\uc74c\uc744 \uae30\uc5b5\ud558\uc2ed\uc2dc\uc624. \uad50\uc721\uc740 \uc9c1\uc6d0\ub4e4\uc774 \uc790\uc2e0\uac10\uc744 \ub192\uc774\uace0 \ud5a5\ud6c4 \uc0ac\uac74\uc744 \ubcf4\uace0\ud560 \uc758\uc9c0\ub97c \ud5a5\uc0c1\uc2dc\ud0a4\ub294 \uac83\uc744 \ubaa9\ud45c\ub85c \ud574\uc57c \ud569\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uc0ac\uc6a9\uc790\uac00 \ud53c\uc2f1\uc758 \uacb0\uacfc\ub97c \uc774\ud574\ud558\ub3c4\ub85d \ud558\uace0, \uc0ac\ub78c\ub4e4\uc744 \uc555\ub3c4\ud558\uc9c0 \uc54a\uc73c\uba74\uc11c \uc2e4\uc81c \uc0ac\ub840 \uc5f0\uad6c\uc640 \uc2e4\uc0dd\ud65c \uc608\uc2dc\ub97c \uc81c\uacf5\ud558\uc2ed\uc2dc\uc624.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ud53c\uc2f1 \uc774\uba54\uc77c\uc744 \ubc1b\uc744 \uac00\ub2a5\uc131\uc774 \ub354 \ub192\uc740 \uc9c1\uc6d0\uacfc \ud611\ub825\ud558\uc2ed\uc2dc\uc624. \uc608\ub97c \ub4e4\uc5b4, \uace0\uac1d \ub300\uba74 \ubd80\uc11c, \uc7ac\ubb34 \ubd80\uc11c \ub610\ub294 IT \uc9c1\uc6d0\uc740 \ud574\ucee4\uc5d0\uac8c \ub354 \ud070 \uad00\uc2ec\uc744 \ubc1b\uc2b5\ub2c8\ub2e4. \uc9c1\uc6d0\ub4e4\uc774 \uc704\ud5d8\uc744 \uc778\uc2dd\ud558\uace0 \ucd94\uac00 \uc9c0\uc6d0\uc744 \uc81c\uacf5\ud558\ub3c4\ub85d \ud558\uc2ed\uc2dc\uc624.<\/span><\/p>\n<h3><b>\uc0ac\uc6a9\uc790\uac00 \uc0ac\uae30\uc131 \uc694\uccad\uc744 \uc778\uc2dd\ud558\uae30 \uc27d\uac8c \ub9cc\ub4dc\uc2ed\uc2dc\uc624<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\uacf5\uaca9\uc790\ub294 \ube44\ubc00\ubc88\ud638\uc5d0 \uc811\uadfc\ud558\uac70\ub098 \uc2b9\uc778\ub418\uc9c0 \uc54a\uc740 \uacb0\uc81c\ub97c \ud558\uae30 \uc704\ud574 \uc0ac\uc6a9\uc790\ub97c \uc624\ub3c4\ud569\ub2c8\ub2e4. \uacf5\uaca9\uc790\uac00 \ubaa8\ubc29\ud560 \uac00\ub2a5\uc131\uc774 \ub354 \ub192\uc740 \ud504\ub85c\uc138\uc2a4\ub97c \uc5fc\ub450\uc5d0 \ub450\uace0 \uc774\ub7ec\ud55c \ud53c\uc2f1 \uacf5\uaca9\uc744 \uc2dd\ubcc4\ud558\uae30 \uc27d\ub3c4\ub85d \uac1c\uc120 \ubc0f \uac80\ud1a0\uac00 \ud544\uc694\ud569\ub2c8\ub2e4.<\/span><\/p>\n<p><strong>\uc774\ub97c \uc5b4\ub5bb\uac8c \ud560 \uc218 \uc788\uc2b5\ub2c8\uae4c?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">\uad00\ub828\ub41c \ubaa8\ub4e0 \uc0ac\ub78c\uc774 \ud504\ub85c\uc138\uc2a4\ub97c \uc798 \uc54c\uace0 \uc788\uc73c\uba70 \ube44\uc815\uc0c1\uc801\uc778 \ud65c\ub3d9\uc744 \uc778\uc2dd\ud560 \uc900\ube44\uac00 \ub418\uc5b4 \uc788\ub294\uc9c0 \ud655\uc778\ud558\uc2ed\uc2dc\uc624.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uc774\uc911 \uc778\uc99d\uc744 \uad6c\ud604\ud558\uc5ec \ubaa8\ub4e0 \uc911\uc694\ud55c \uc774\uba54\uc77c \uc694\uccad\uc774 \ubb38\uc790 \uba54\uc2dc\uc9c0, \uc804\ud654 \ub610\ub294 \ub300\uba74\uacfc \uac19\uc740 \ub450 \ubc88\uc9f8 \uc720\ud615\uc758 \ucee4\ubba4\ub2c8\ucf00\uc774\uc158\uc744 \ud1b5\ud574 \ud655\uc778\ub418\ub3c4\ub85d \ud558\uc2ed\uc2dc\uc624. \ud30c\uc77c\uc744 \uacf5\uc720\ud558\ub294 \ub610 \ub2e4\ub978 \ubc29\ubc95\uc740 \uc561\uc138\uc2a4 \uc81c\uc5b4\ub41c \ud074\ub77c\uc6b0\ub4dc \uacc4\uc815\uc744 \ud1b5\ud574 \uc774\uba54\uc77c\uc5d0 \ucca8\ubd80 \ud30c\uc77c\uc744 \ud53c\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Consider telling your suppliers or customers what they should look for, such as \u201cwe will never ask you for your password or bank details\u201d.<\/span><\/p>\n<h3><b>\ud544\uc694\ud560 \ub54c \ub3c4\uc6c0\uc744 \uc694\uccad\ud558\ub3c4\ub85d \uc0ac\uc6a9\uc790\ub97c \uaca9\ub824\ud558\uc2ed\uc2dc\uc624<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\uc88b\uc740 \ubcf4\uace0 \ubb38\ud654\ub97c \uad6c\ucd95\ud558\uba74 \uc0ac\uc6a9\uc790\uac00 \ub3c4\uc6c0\uc744 \uc694\uccad\ud560 \uc218 \uc788\uc73c\uba70 \uc870\uc9c1\uc744 \ub300\uc0c1\uc73c\ub85c \ud558\ub294 \ud53c\uc2f1 \uacf5\uaca9 \uc720\ud615\uc5d0 \ub300\ud55c \uc911\uc694\ud55c \uc815\ubcf4\ub97c \uc81c\uacf5\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub610\ud55c \ud53c\uc2f1\uc73c\ub85c \uc624\uc778\ub418\ub294 \uc774\uba54\uc77c \uc720\ud615\uacfc \uac1c\uc120\ud560 \uc218 \uc788\ub294 \uc0ac\ud56d\uc744 \ubc30\uc6b8 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><strong>\uc774\ub97c \uc5b4\ub5bb\uac8c \ud560 \uc218 \uc788\uc2b5\ub2c8\uae4c?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Create an effective process for users to report when they think phishing attempts might have passed your organization\u2019s technical defences. Ensure the process is clear, simple and convenient.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uc5b4\ub5a4 \uc870\uce58\uac00 \ucde8\ud574\uc84c\ub294\uc9c0\uc5d0 \ub300\ud55c \ube60\ub974\uace0 \uad6c\uccb4\uc801\uc778 \ud53c\ub4dc\ubc31\uc744 \uc81c\uacf5\ud558\uace0, \uadf8\ub4e4\uc758 \uae30\uc5ec\uac00 \ucc28\uc774\ub97c \ub9cc\ub4e4\uace0 \ub3c4\uc6c0\uc774 \ub41c\ub2e4\ub294 \uac83\uc744 \ubd84\uba85\ud788 \ud558\uc2ed\uc2dc\uc624.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ube44\uacf5\uc2dd\uc801\uc778 \ucee4\ubba4\ub2c8\ucf00\uc774\uc158 \ucc44\ub110\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc9c1\uc6d0\ub4e4\uc774 \uc8fc\uc81c\uc5d0 \ub300\ud574 \uc27d\uac8c \uc774\uc57c\uae30\ud558\uace0 \uc9c0\uc6d0\uacfc \uc9c0\uce68\uc744 \uc694\uccad\ud560 \uc218 \uc788\ub294 \ud658\uacbd\uc744 \uc870\uc131\ud558\ub294 \ubc29\ubc95\uc744 \uc0dd\uac01\ud574 \ubcf4\uc2ed\uc2dc\uc624.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ud53c\uc2f1\uacfc \uad00\ub828\ud558\uc5ec \ucc98\ubc8c\uc774\ub098 \ube44\ub09c \uc9c0\ud5a5\uc801\uc778 \ubb38\ud654\ub97c \uc870\uc131\ud558\uc9c0 \ub9c8\uc2ed\uc2dc\uc624.<\/span><\/p>\n<h2><b>\uacc4\uce35 3: \ud0d0\uc9c0\ub418\uc9c0 \uc54a\uc740 \ud53c\uc2f1 \uc774\uba54\uc77c\uc758 \uc601\ud5a5\uc744 \uc870\uc9c1\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\uc2ed\uc2dc\uc624<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\uc774 \uacc4\uce35\uc740 \ud0d0\uc9c0\ub418\uc9c0 \uc54a\uc740 \ud53c\uc2f1 \uc774\uba54\uc77c\uc758 \uc601\ud5a5\uc744 \ucd5c\uc18c\ud654\ud558\ub294 \ubc29\ubc95\uc744 \uc124\uba85\ud569\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>\uae30\uae30\ub97c \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\uc2ed\uc2dc\uc624<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub294 \uc774\uba54\uc77c\uc774\ub098 \uac00\uc9dc \uc6f9\uc0ac\uc774\ud2b8\uc5d0 \uc228\uaca8\uc838 \uc788\uc9c0\ub9cc \uc774\uba54\uc77c\uc744 \ud074\ub9ad\ud558\ub354\ub77c\ub3c4 \uae30\uae30\uac00 \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uc124\uce58\ub97c \uc911\uc9c0\ud558\ub3c4\ub85d \uad6c\uc131\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><strong>\uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub97c \uc5b4\ub5bb\uac8c \ubc29\uc9c0\ud560 \uc218 \uc788\uc2b5\ub2c8\uae4c?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">\uacf5\uaca9\uc790\uac00 \ucde8\uc57d\uc810\uc744 \ud0d0\uc0c9\ud558\uc9c0 \ubabb\ud558\ub3c4\ub85d \ubc29\uc9c0\ud558\ub294 \ud55c \uac00\uc9c0 \ubc29\ubc95\uc740 \uc9c0\uc6d0\ub418\ub294 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uc640 \uc7a5\uce58\ub97c \uc0ac\uc6a9\ud558\uace0 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uc790, \ud558\ub4dc\uc6e8\uc5b4 \uacf5\uae09\uc5c5\uccb4 \ubc0f \uacf5\uae09\uc5c5\uccb4\uc758 \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8\ud558\ub294 \uac83\uc785\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uad00\ub9ac\uc790 \uacc4\uc815 \uc0ac\uc6a9\uc744 \ud544\uc694\ud55c \uc9c1\uc6d0\uc5d0\uac8c\ub9cc \uc81c\ud55c\ud558\uc2ed\uc2dc\uc624. \uadf8\ub7ec\ub098 \uad00\ub9ac\uc790 \uacc4\uc815\uc744 \uac00\uc9c4 \uc0ac\ub78c\uc740 \uc774\uba54\uc77c\uc744 \ud655\uc778\ud558\uac70\ub098 \uc6f9\uc744 \ud0d0\uc0c9\ud558\ub294 \ub370 \uc774\ub97c \uc0ac\uc6a9\ud574\uc11c\ub294 \uc548 \ub429\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ub9e4\ud06c\ub85c \ube44\ud65c\uc131\ud654, \uc548\ud2f0\uba40\uc6e8\uc5b4 \uc18c\ud504\ud2b8\uc6e8\uc5b4, \uc548\ud2f0\ubc14\uc774\ub7ec\uc2a4 \ub4f1\uacfc \uac19\uc740 \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uc5d0 \ub300\ud55c \ub2e4\ub978 \ubcf4\uc548 \ubc29\uc5b4\ub97c \uace0\ub824\ud558\uc2ed\uc2dc\uc624. \uadf8\ub7ec\ub098 \ub2e4\uc591\ud55c \uc7a5\uce58\uc5d0 \uc801\ud569\ud55c \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \ubc29\uc5b4 \uc720\ud615\uc744 \ud655\uc778\ud574\uc57c \ud569\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>\uc0ac\uc6a9\uc790\ub97c \uc545\uc131 \uc0ac\uc774\ud2b8\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\uc2ed\uc2dc\uc624<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\uc545\uc131 \uc6f9\uc0ac\uc774\ud2b8\ub85c\uc758 \ub9c1\ud06c\ub294 \ud56d\uc0c1 \ud53c\uc2f1 \uc774\uba54\uc77c\uc758 \uac00\uc7a5 \uc911\uc694\ud55c \ubd80\ubd84\uc785\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ub9c1\ud06c\uac00 \uc6f9\uc0ac\uc774\ud2b8\ub97c \uc5f4 \uc218 \uc5c6\ub294 \uacbd\uc6b0 \uacf5\uaca9\uc740 \uc644\ub8cc\ub418\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><strong>\uc774\ub97c \uc5b4\ub5bb\uac8c \ud560 \uc218 \uc788\uc2b5\ub2c8\uae4c?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">\ucd5c\uc2e0 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub294 \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uac00 \ud3ec\ud568\ub41c \uc6f9\uc0ac\uc774\ud2b8\ub97c \ucc28\ub2e8\ud569\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \uc774 \uc635\uc158\uc740 \ubaa8\ubc14\uc77c \uc7a5\uce58\uc5d0\uc11c \ud56d\uc0c1 \uc0ac\uc6a9\ud560 \uc218 \uc788\ub294 \uac83\uc740 \uc544\ub2d9\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uc870\uc9c1\uc740 \uc0ac\ub0b4 \ub610\ub294 \ud074\ub77c\uc6b0\ub4dc\uc5d0\uc11c \ud504\ub85d\uc2dc \uc11c\ube44\uc2a4\ub97c \uc2e4\ud589\ud558\uc5ec \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub098 \ud53c\uc2f1 \ucea0\ud398\uc778\uc744 \ud638\uc2a4\ud305\ud558\ub294 \uac83\uc73c\ub85c \uc2dd\ubcc4\ub41c \uc6f9\uc0ac\uc774\ud2b8\uc5d0 \ub300\ud55c \ubaa8\ub4e0 \uc811\uadfc \uc2dc\ub3c4\ub97c \ucc28\ub2e8\ud574\uc57c \ud569\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>\ub354 \uac15\ub825\ud55c \uc778\uc99d\uc73c\ub85c \uacc4\uc815\uc744 \ubcf4\ud638\ud558\uc2ed\uc2dc\uc624<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\ud574\ucee4\ub294 \ud56d\uc0c1 \ube44\ubc00\ubc88\ud638\ub97c \ub178\ub9ac\uace0 \uc788\uc73c\uba70, \ud2b9\ud788 \ubbfc\uac10\ud55c \uc815\ubcf4, \uae08\uc735 \uc790\uc0b0 \ub610\ub294 IT \uc2dc\uc2a4\ud15c\uc5d0 \uc811\uadfc\ud560 \uc218 \uc788\ub294 \uacc4\uc815\uc758 \ube44\ubc00\ubc88\ud638\ub97c \ub178\ub9ac\uace0 \uc788\uc2b5\ub2c8\ub2e4. \ub85c\uadf8\uc778 \ud504\ub85c\uc138\uc2a4\ub97c \ud53c\uc2f1\uc5d0 \ub354 \uac15\ub825\ud558\uac8c \ub9cc\ub4e4\uace0 \ubbfc\uac10\ud55c \uc815\ubcf4\uc5d0 \ub300\ud55c \ud2b9\uad8c \uc811\uadfc\uc744 \uac00\uc9c4 \uacc4\uc815 \uc218\ub97c \uc81c\ud55c\ud558\uc2ed\uc2dc\uc624.<\/span><\/p>\n<p><strong>\uc774\ub97c \uc5b4\ub5bb\uac8c \ud560 \uc218 \uc788\uc2b5\ub2c8\uae4c?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">\uc774\uc911 \uc778\uc99d(2FA) \ub610\ub294 \uc774\uc911 \ub2e8\uacc4 \uc778\uc99d\uc744 \ud65c\uc131\ud654\ud558\uc2ed\uc2dc\uc624. \ub450 \ubc88\uc9f8 \uc694\uc18c\uac00 \uc788\uc73c\uba74 \uacf5\uaca9\uc790\uac00 \ub3c4\ub09c\ub2f9\ud55c \ube44\ubc00\ubc88\ud638\ub97c \uc0ac\uc6a9\ud558\uc5ec \uacc4\uc815\uc5d0 \uc811\uadfc\ud560 \uc218 \uc5c6\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ube44\ubc00\ubc88\ud638 \uad00\ub9ac\uc790\ub97c \uc0ac\uc6a9\ud558\uc2ed\uc2dc\uc624. \uc77c\ubd80\ub294 \uc2e4\uc81c \uc6f9\uc0ac\uc774\ud2b8\ub97c \uc778\uc2dd\ud558\uace0 \uac00\uc9dc \uc6f9\uc0ac\uc774\ud2b8\uc5d0\uc11c\ub294 \uc790\ub3d9 \uc644\uc131\uc744 \ud558\uc9c0 \uc54a\uc73c\ubbc0\ub85c \uac00\uc9dc \uc6f9\uc0ac\uc774\ud2b8\uc5d0 \ub85c\uadf8\uc778 \uc815\ubcf4\ub97c \uc81c\uacf5\ud558\uc9c0 \uc54a\uac8c \ub429\ub2c8\ub2e4. \ub610\ud55c \uc7a5\uce58\uac00 \uc2e4\uc81c \uc6f9\uc0ac\uc774\ud2b8\ub97c \uc778\uc2dd\ud558\uace0 \uc790\ub3d9\uc73c\ub85c \ub85c\uadf8\uc778\ud558\ub294 \ub2e8\uc77c \ub85c\uadf8\uc778 \ubc29\ubc95\uc744 \uc0ac\uc6a9\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc774 \ub450 \uac00\uc9c0 \uae30\uc220\uc740 \ube44\ubc00\ubc88\ud638\ub97c \uc218\ub3d9\uc73c\ub85c \uc785\ub825\ud558\ub294 \uac83\uc744 \ud53c\ud558\ubbc0\ub85c \uc0ac\uc774\ud2b8\uc5d0\uc11c \uc0ac\uc6a9\uc790\uac00 \ube44\ubc00\ubc88\ud638\ub97c \uc785\ub825\ud558\ub3c4\ub85d \uc694\uccad\ud558\ub294 \uacbd\uc6b0 \ube44\uc815\uc0c1\uc801\uc77c \uac83\uc785\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uc0dd\uccb4 \uc778\uc2dd\uc774\ub098 \uc2a4\ub9c8\ud2b8\uce74\ub4dc\uc640 \uac19\uc774 \ub3c4\ub09c\ud558\uae30 \ub354 \uc5b4\ub824\uc6b4 \ub300\uccb4 \ub85c\uadf8\uc778 \uba54\ucee4\ub2c8\uc998\uc744 \uc0ac\uc6a9\ud558\ub294 \uac83\uc744 \uace0\ub824\ud558\uc2ed\uc2dc\uc624.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ub354 \uc774\uc0c1 \uc0ac\uc6a9\ub418\uc9c0 \uc54a\ub294 \uacc4\uc815\uc744 \uc81c\uac70\ud558\uac70\ub098 \uc77c\uc2dc \uc911\uc9c0\ud558\uc2ed\uc2dc\uc624.<\/span><\/p>\n<h2><b>\uacc4\uce35 4: \uc0ac\uac74\uc5d0 \uc2e0\uc18d\ud558\uac8c \ub300\uc751\ud558\uc2ed\uc2dc\uc624<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\ubaa8\ub4e0 \uc870\uc9c1\uc740 \uc5b4\ub290 \uc2dc\uc810\uc5d0\uc11c \uc0ac\uc774\ubc84 \uacf5\uaca9\uc744 \uacbd\ud5d8\ud560 \uac83\uc785\ub2c8\ub2e4. \uc774\ub97c \uc778\uc2dd\ud558\uace0 \uc989\uc2dc \ub300\uc751\ud560 \uacc4\ud68d\uc744 \uc0ac\uc804\uc5d0 \ub9c8\ub828\ud558\ub294 \uac83\uc774 \uac00\uc7a5 \uc2ec\uac01\ud55c \uacb0\uacfc\ub97c \ud53c\ud558\uae30 \uc704\ud574 \uc911\uc694\ud569\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>\uc0ac\uac74\uc744 \uc2e0\uc18d\ud558\uac8c \uac10\uc9c0\ud558\uc2ed\uc2dc\uc624<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\uc0ac\uac74\uc744 \ube68\ub9ac \uc54c\uc218\ub85d \ud53c\ud574\ub97c \uc81c\ud55c\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><strong>\uc774\ub97c \uc5b4\ub5bb\uac8c \ud560 \uc218 \uc788\uc2b5\ub2c8\uae4c?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">\ubcf4\uc548 \ubaa8\ub2c8\ud130\ub9c1 \uae30\ub2a5\uc744 \ud1b5\ud574 \uc0ac\uc6a9\uc790\uac00 \uc778\uc2dd\ud558\uc9c0 \ubabb\ud558\ub294 \uc0ac\uac74\uc744 \uac10\uc9c0\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ubaa8\ub4e0 \uc870\uc9c1\uc5d0\uc11c \uc774\ub97c \uac00\ub2a5\ud558\uac8c \ud560 \uc218\ub294 \uc5c6\uc73c\ubbc0\ub85c \uc218\uc2e0\ub41c \uc774\uba54\uc77c \uae30\ub85d, \uc811\uadfc\ud55c \uc6f9 \uc8fc\uc18c \ubc0f \uc678\ubd80 IP \uc8fc\uc18c\uc640\uc758 \uc5f0\uacb0\uacfc \uac19\uc740 \ub85c\uadf8\ub97c \uc218\uc9d1\ud558\ub294 \uac83\uc73c\ub85c \uc2dc\uc791\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc774 \uc815\ubcf4\ub97c \uc218\uc9d1\ud558\ub824\uba74 \ud074\ub77c\uc6b0\ub4dc \ubcf4\uc548 \ud328\ub110\uacfc \uac19\uc740 \uae30\uc131 \uc11c\ube44\uc2a4\uc5d0 \ub0b4\uc7a5\ub41c \ubaa8\ub2c8\ud130\ub9c1 \ub3c4\uad6c\ub97c \uc0ac\uc6a9\ud558\uac70\ub098 \uc0ac\ub0b4 \ud300\uc744 \uad6c\ucd95\ud558\uac70\ub098 \uad00\ub9ac \ubcf4\uc548 \ubaa8\ub2c8\ud130\ub9c1 \uc11c\ube44\uc2a4\uc5d0 \uc544\uc6c3\uc18c\uc2f1\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc218\uc9d1 \ubc0f \uc800\uc7a5\ud560 \uc591\uc740 \uc608\uc0b0\uc5d0 \ub530\ub77c \ub2e4\ub985\ub2c8\ub2e4. \uc774\ub97c \uc218\ud589\ud55c \ud6c4\uc5d0\ub294 \ucd5c\uc2e0 \uc0c1\ud0dc\ub97c \uc720\uc9c0\ud558\uc5ec \ud6a8\uacfc\ub97c \uc720\uc9c0\ud558\ub3c4\ub85d \ud558\uc2ed\uc2dc\uc624.<\/span><\/p>\n<h3><b>\uc0ac\uac74 \ub300\uc751 \uacc4\ud68d\uc744 \uc218\ub9bd\ud558\uc2ed\uc2dc\uc624<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\uadc0\ud558 \ub610\ub294 \uadc0\ud558\uc758 \uc9c1\uc6d0 \uc911 \uc77c\ubd80\uac00 \ud53c\uc2f1 \uacf5\uaca9\uc744 \ubc1c\uacac\ud55c \uacbd\uc6b0 \uac00\ub2a5\ud55c \ud55c \ube68\ub9ac \ud53c\ud574\ub97c \ubc29\uc9c0\ud558\uae30 \uc704\ud574 \ubb34\uc5c7\uc744 \ud574\uc57c \ud558\ub294\uc9c0 \uc54c\uc544\uc57c \ud569\ub2c8\ub2e4.<\/span><\/p>\n<p><strong>\uc774\ub97c \uc5b4\ub5bb\uac8c \ud560 \uc218 \uc788\uc2b5\ub2c8\uae4c?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">\uc870\uc9c1\uc758 \ubaa8\ub4e0 \uc0ac\ub78c\uc774 \ub2e4\uc591\ud55c \uc720\ud615\uc758 \uc0ac\uac74\uc5d0 \ub300\ud574 \ubb34\uc5c7\uc744 \ud574\uc57c \ud558\ub294\uc9c0, \uadf8\ub4e4\uc758 \ucc45\uc784\uc740 \ubb34\uc5c7\uc778\uc9c0, \uc5b4\ub5bb\uac8c \ud574\uc57c \ud558\ub294\uc9c0 \uc54c\uace0 \uc788\ub294\uc9c0 \ud655\uc778\ud558\uc2ed\uc2dc\uc624. \uacc4\ud68d\uc774 \uc870\uc9c1\uc758 \ubc95\uc801 \ubc0f \uaddc\uc81c \uc758\ubb34\ub97c \uc900\uc218\ud558\ub294\uc9c0 \ud655\uc778\ud558\uc2ed\uc2dc\uc624. \uc0ac\uac74 \ub300\uc751 \uacc4\ud68d\uc740 \uc808\ucc28\uc640 \uc5ed\ud560\uc5d0 \uc775\uc219\ud574\uc9c0\uae30 \uc704\ud574 \uc0ac\uc804\uc5d0 \uc5f0\uc2b5\ud574\uc57c \ud569\ub2c8\ub2e4.<\/span><\/p>\n<h2><b>\ucd5c\uc885 \uc0dd\uac01<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\uacb0\ub860\uc801\uc73c\ub85c \ud53c\uc2f1 \uacf5\uaca9\uc740 \uac1c\uc778\uacfc \uc870\uc9c1\uc5d0 \uc2ec\uac01\ud55c \uacb0\uacfc\ub97c \ucd08\ub798\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub294 \ud558\ub098\uc758 \uc194\ub8e8\uc158\uc73c\ub85c \ud574\uacb0\ud560 \uc218 \uc788\ub294 \ubb38\uc81c\uac00 \uc544\ub2c8\ub77c \ub2e4\uc591\ud55c \ubc29\uc5b4 \uacc4\uce35\uc744 \uad6c\ud604\ud568\uc73c\ub85c\uc368 \ud574\uacb0\ud560 \uc218 \uc788\ub2e4\ub294 \uc810\uc744 \uae30\uc5b5\ud558\ub294 \uac83\uc774 \uc911\uc694\ud569\ub2c8\ub2e4. \uc5ec\uae30\uc5d0\ub294 \ubcf4\uc548 \uc774\uba54\uc77c \uac8c\uc774\ud2b8\uc6e8\uc774 \ubc0f \ud504\ub85d\uc2dc \uc11c\ube44\uc2a4 \uc0ac\uc6a9\uacfc \uac19\uc740 \uae30\uc220\uc801 \uc870\uce58\ubfd0\ub9cc \uc544\ub2c8\ub77c \uc9c1\uc6d0\uc5d0\uac8c \ud53c\uc2f1 \uc2dc\ub3c4\ub97c \uc778\uc2dd\ud558\ub294 \ubc29\ubc95\uc744 \uad50\uc721\ud558\uae30 \uc704\ud55c \uac15\ub825\ud55c \uc778\uc99d \ubc0f \uc815\uae30\uc801\uc778 \uc0ac\uc6a9\uc790 \uad50\uc721\uc774 \ud3ec\ud568\ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub9c8\uc9c0\ub9c9\uc73c\ub85c, \uacf5\uaca9\uc774 \ubc1c\uc0dd\ud560 \uacbd\uc6b0 \ud53c\ud574\ub97c \ucd5c\uc18c\ud654\ud558\uace0 \uc2e0\uc18d\ud558\uac8c \ubcf5\uad6c\ud558\uae30 \uc704\ud55c \ub300\uc751 \uacc4\ud68d\uc744 \uc900\ube44\ud558\ub294 \uac83\uc774 \uc911\uc694\ud569\ub2c8\ub2e4.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>\uc6d0\uaca9 \uacf5\uaca9 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%ec%82%ac%ec%9d%b4%eb%b2%84-%ea%b3%b5%ea%b2%a9\/%eb%b9%84%ec%a6%88%eb%8b%88%ec%8a%a4%eb%a5%bc-%ec%9d%b4%eb%a9%94%ec%9d%bc-%ed%94%bc%ec%8b%b1-%ea%b3%b5%ea%b2%a9%ec%9c%bc%eb%a1%9c%eb%b6%80%ed%84%b0-%eb%b3%b4%ed%98%b8%ed%95%98%eb%8a%94-%eb%b0%a9\/\"><span class=\"screen-reader-text\">\uc0ac\uc774\ubc84 \ubc94\uc8c4\ub294 \uc774\uc81c \uae30\uc5c5\uc774 \ub9e4\uc77c \uc9c1\uba74\ud558\ub294 \ub9ce\uc740 \ubb38\uc81c \uc911 \ud558\ub098\uc785\ub2c8\ub2e4. \uae30\uc220\uc740 \ub9ce\uc740 \ud68c\uc0ac\uc758 \ubc1c\uc804\uc758 \uc8fc\ucd95\uc774 \ub418\uc5b4 \uc654\uc73c\uba70, \ub514\uc9c0\ud138 \uce21\uba74\uc774 \ub354\uc6b1 \ud544\uc218\uc801\uc774 \ub418\uba74\uc11c\u2026<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":3,"featured_media":1225,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-1221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Business Protection From Email Phishing Attacks | Security Briefing<\/title>\n<meta name=\"description\" content=\"It is essential to have the best email security. With this article, you can learn how to detect and prevent email phishing attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uacf5\uaca9\/\ube44\uc988\ub2c8\uc2a4\ub97c-\uc774\uba54\uc77c-\ud53c\uc2f1-\uacf5\uaca9\uc73c\ub85c\ubd80\ud130-\ubcf4\ud638\ud558\ub294-\ubc29\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Business Protection From Email Phishing Attacks | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"It is essential to have the best email security. With this article, you can learn how to detect and prevent email phishing attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uacf5\uaca9\/\ube44\uc988\ub2c8\uc2a4\ub97c-\uc774\uba54\uc77c-\ud53c\uc2f1-\uacf5\uaca9\uc73c\ub85c\ubd80\ud130-\ubcf4\ud638\ud558\ub294-\ubc29\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-09T13:13:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1709\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"12\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"How to Protect Your Business From Email Phishing Attacks\",\"datePublished\":\"2022-11-09T13:13:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/\"},\"wordCount\":2338,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg\",\"articleSection\":[\"Cyber Attacks\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/\",\"name\":\"Business Protection From Email Phishing Attacks | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg\",\"datePublished\":\"2022-11-09T13:13:26+00:00\",\"description\":\"It is essential to have the best email security. With this article, you can learn how to detect and prevent email phishing attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg\",\"width\":2560,\"height\":1709,\"caption\":\"Email phishing attacks image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Protect Your Business From Email Phishing Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\uc774\uba54\uc77c \ud53c\uc2f1 \uacf5\uaca9\uc73c\ub85c\ubd80\ud130\uc758 \ube44\uc988\ub2c8\uc2a4 \ubcf4\ud638 | \ubcf4\uc548 \ube0c\ub9ac\ud551","description":"\ucd5c\uace0\uc758 \uc774\uba54\uc77c \ubcf4\uc548\uc744 \uac16\ucd94\ub294 \uac83\uc740 \ud544\uc218\uc801\uc785\ub2c8\ub2e4. \uc774 \uae30\uc0ac\ub85c \uc774\uba54\uc77c \ud53c\uc2f1 \uacf5\uaca9\uc744 \uac10\uc9c0\ud558\uace0 \ubc29\uc9c0\ud558\ub294 \ubc29\ubc95\uc744 \ubc30\uc6b8 \uc218 \uc788\uc2b5\ub2c8\ub2e4.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uacf5\uaca9\/\ube44\uc988\ub2c8\uc2a4\ub97c-\uc774\uba54\uc77c-\ud53c\uc2f1-\uacf5\uaca9\uc73c\ub85c\ubd80\ud130-\ubcf4\ud638\ud558\ub294-\ubc29\/","og_locale":"ko_KR","og_type":"article","og_title":"Business Protection From Email Phishing Attacks | Security Briefing","og_description":"It is essential to have the best email security. With this article, you can learn how to detect and prevent email phishing attacks.","og_url":"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uacf5\uaca9\/\ube44\uc988\ub2c8\uc2a4\ub97c-\uc774\uba54\uc77c-\ud53c\uc2f1-\uacf5\uaca9\uc73c\ub85c\ubd80\ud130-\ubcf4\ud638\ud558\ub294-\ubc29\/","og_site_name":"Security Briefing","article_published_time":"2022-11-09T13:13:26+00:00","og_image":[{"width":2560,"height":1709,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"C\u00e9sar Daniel Barreto","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"12\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"How to Protect Your Business From Email Phishing Attacks","datePublished":"2022-11-09T13:13:26+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/"},"wordCount":2338,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg","articleSection":["Cyber Attacks"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/","name":"\uc774\uba54\uc77c \ud53c\uc2f1 \uacf5\uaca9\uc73c\ub85c\ubd80\ud130\uc758 \ube44\uc988\ub2c8\uc2a4 \ubcf4\ud638 | \ubcf4\uc548 \ube0c\ub9ac\ud551","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg","datePublished":"2022-11-09T13:13:26+00:00","description":"\ucd5c\uace0\uc758 \uc774\uba54\uc77c \ubcf4\uc548\uc744 \uac16\ucd94\ub294 \uac83\uc740 \ud544\uc218\uc801\uc785\ub2c8\ub2e4. \uc774 \uae30\uc0ac\ub85c \uc774\uba54\uc77c \ud53c\uc2f1 \uacf5\uaca9\uc744 \uac10\uc9c0\ud558\uace0 \ubc29\uc9c0\ud558\ub294 \ubc29\ubc95\uc744 \ubc30\uc6b8 \uc218 \uc788\uc2b5\ub2c8\ub2e4.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg","width":2560,"height":1709,"caption":"Email phishing attacks image"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"How to Protect Your Business From Email Phishing Attacks"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0\ub294 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \ub300\ud55c \uae4a\uc774 \uc788\ub294 \uc9c0\uc2dd\uacfc \ubcf5\uc7a1\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc8fc\uc81c\ub97c \ub2e8\uc21c\ud654\ud558\ub294 \ub2a5\ub825\uc73c\ub85c \uc720\uba85\ud55c \uc800\uba85\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc791\uac00\uc774\uc790 \uc804\ubb38\uac00\uc785\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \ubc0f \ub370\uc774\ud130 \ubcf4\ud638 \ubd84\uc57c\uc5d0\uc11c \ud3ed\ub113\uc740 \uacbd\ud5d8\uc744 \uc313\uc740 \uadf8\ub294 \uc815\uae30\uc801\uc73c\ub85c \ucd5c\uc2e0 \uc0ac\uc774\ubc84 \ubcf4\uc548 \ud2b8\ub80c\ub4dc\uc5d0 \ub300\ud55c \ud1b5\ucc30\ub825 \uc788\ub294 \uae30\uace0\uc640 \ubd84\uc11d\uc744 \ud1b5\ud574 \uc804\ubb38\uac00\uc640 \uc77c\ubc18\uc778 \ubaa8\ub450\ub97c \uad50\uc721\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","url":"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=1221"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1221\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/1225"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=1221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=1221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=1221"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}