“
Everywhere you go you’ll have to work as a team, whether it’s at school or at a full-time job, and GreenStone is no exception.
”
interns is an etiquette lunch and presentation. The students learned about proper dining behavior and manners, followed by a chance to test their new knowledge at a lunch prepared by a Michigan State University master chef. “Just knowing how to conduct myself during a business outing with the proper manners is very valuable to learn,” says systems administrator intern, Robert Dunne. “The etiquette presentation gave me confidence to go out and have lunch with people who were higher up and know how to impress them.” As the summer came to a close and GreenStone’s 2019 class of interns returned to class, it is apparent the students are better prepared for the next chapter in their lives. Although responsibilities vary, teamwork plays a pivotal and consistent role at GreenStone and the internship program is no exception. Being able to work with other interns, supervisors, different departments and the leadership team prepares interns for a successful future and helps to set them above their peers. “Everywhere you go you’ll have to work as a team, whether it’s at school or at a full-time job, and GreenStone is no exception. But the teamwork here is something that is going to help you be able to talk with different people in different roles,” explains Caitlyn Meyers, credit intern. “Everyone here is more than willing to help you and you won’t work with nicer people.” Congratulations to the summer 2019 class of interns and best of luck on your future endeavors. GreenStone is now recruiting for 2020 summer internship opportunities. If you or someone you know may be interested in a collaborative yet challenging experience, visit greenstonefcs.com/careers. ■
i TARGETED PHISHING ATTACKS (SPEAR PHISHING) In the last issue of Partners, Summer 2019, we dove into how to spot a phishing email. Most phishing emails contain the same indicators of compromise that help us determine the message is a phishing email. However, there is another type of phishing attack that is harder to detect – Targeted Phishing Attack, also known as a Spear Phish. These types of messages contain information meaningful to the recipient. In some cases, these messages might contain an old password the phisher or ‘bad actor’ retrieved from breached websites, or personal information gleamed from social media sites like Facebook or Instagram. Using information that is relevant to us makes us more likely to open and take action on the phish. The goal of these targeted attacks is the same as a normal phishing message, the bad actors want to compromise your personal information and gain hidden access to your computer. These attacks can be more difficult to identify due to the very personalized information that they contain. Fortunately, targeted phishing emails have similar characteristics as normal phishing emails. Recognizing these tactics can help you identify the attacks: • The email might include a suspicious attachment. • The email urges you to take immediate action. • The email urges you to pay ransom, or else…. If you were not expecting the email, even if it may appear to be from someone familiar with you, or if the message is urging you to act or pay ransom, report the message as junk. If you believe your account(s) could be compromised, refer back to the Summer 2019 Tech Tip (available on the GreenStone website under ‘Partners’) for more details on updating your passwords and enabling two-factor authentication. ■
...Tech Tip
Partners — Fall 2019
38