Security Behaviour Database
All Behaviours > SB082 Uses known contact details to verify suspicious messages

SB082 Uses known contact details to verify suspicious messages

Contact details can be spoofed. Receiving a message that breaks any norms should be met with suspicion. Using known contact details to check the request helps to determine if it is legitimate or not.

Why is it important?

Attackers will attempt to impersonate people who are trusted. Their impersonation may not always be accurate.

Checking if a person is legitimate if there is any suspicion can prevent confidential or sensitive information being disclosed.

Priority Tier

Behaviours in SebDB are ranked by their impact on risk. Tier 1 behaviours have the biggest impact, Tier 4 behaviours the least.

Tier 1

Risk Mitigated

Malware Infection

Malware Infection

Malware infections occur when malicious software makes its way on to a device or network.

Data Theft

Data Theft

Data theft is the intentional stealing of data.

Personal Exposure

Personal Exposure

Personal exposure is the extent to how much someones personal information is available online.

Further reading

SebDB is brought to you byCybSafe| © 2023 CybSafe Ltd