Categories: US-Cert-Repository

CISA Insights: Email-Based Attacks on Elections-Related Entities



Original release date: September 10, 2020

The Cybersecurity and Infrastructure Security Agency (CISA) has released CISA Insights: Actions to Counter Email-Based Attacks on Elections-Related Entities in light of increased sophisticated phishing operations targeting individuals and groups involved in the upcoming U.S. elections.

CISA strongly recommends elections-related individuals and organizations to prioritize the protection of email accounts and systems.

  • Use provider-offered protections, if utilizing cloud email.
  • Secure user accounts on high value services.
  • Implement email authentication and other best practices.
  • Secure email gateway capabilities.

See the following resources for more information.

  • CISA Insights: Actions to Counter Email-Based Attacks on Elections-Related Entities
  • CISA Tip: Best Practices for Securing Election Systems
  • CISA Tip: Avoiding Social Engineering and Phishing Scams
  • Microsoft Blog: New cyberattacks targeting U.S. elections

This product is provided subject to this Notification and this Privacy & Use policy.



Source link

admin

Share
Published by
admin

Recent Posts

CISA Releases Four Industrial Control Systems Advisories

CISA released four Industrial Control Systems (ICS) advisories on June 10, 2025. These advisories provide…

2 days ago

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence…

3 days ago

CISA Releases Three Industrial Control Systems Advisories

CISA released three Industrial Control Systems (ICS) advisories on June 3, 2025. These advisories provide…

5 days ago

CISA Releases Seven Industrial Control Systems Advisories

CISA released seven Industrial Control Systems (ICS) advisories on June 5, 2025. These advisories provide…

6 days ago

CISA Adds One Known Exploited Vulnerability to Catalog

 CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence…

7 days ago

This website uses cookies.