Avoiding Phishing Attacks

Written by Ketan Kapadia

What is a phishing attack?

Phishing is a form of social engineering attack often used to steal user data, including login credentials and credit card numbers. Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization. For example, an attacker may send an email seemingly from a reputable credit card company or financial institution or a retail organization that requests account information, often suggesting that there is a problem. When users respond with the requested information, attackers can use it to gain access to the accounts. Phishing attacks may also appear to come from other types of organizations, such as charities. Attackers often take advantage of current events and certain times of the year, such as

  • Epidemics and health scares (e.g., Coronavirus)
  • Natural disasters (e.g., fires in Australia)
  • Economic concerns (e.g., IRS and / Tax return scams)
  • Major political elections
  • Holidays

What are the common indicators of phishing attempts?

  • Suspicious sender’s address – The sender’s address may imitate a legitimate business. Cybercriminals often use an email address that closely resembles one from a reputable company by altering or omitting a few characters.

  • Spoofed hyperlinks – If you hover your cursor over any links in the body of the email, and the links do not match the text that appears when hovering over them, the link may be spoofed. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com vs. .net). Additionally, cybercriminals may use a URL shortening service to hide the true destination of the link.

  • Suspicious attachments – An unsolicited email requesting a user to download and open an attachment is a common delivery mechanism for malware. A cybercriminal may use a false sense of urgency or importance to help persuade a user to download or open an attachment without examining it first.

  • Generic greetings and signature – Both a generic greeting—such as “Dear Valued Customer” or “Sir/Ma’am”—and a lack of contact information in the signature block are strong indicators of a phishing email. A trusted organization will normally address you by name and provide their contact information.

How do you avoid being a victim?

  • Be suspicious of unsolicited email messages, text messages, phone calls, or instant messages from individuals asking about personal or employee information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.
  • Do not provide personal information or information about your organization, unless you are certain of a person’s authority to have the information.
  • Do not reveal personal or financial information in email or text messages or instant messages, and do not respond to solicitations for this information. This includes following links sent in email or text messages.
  • Pay attention to the Uniform Resource Locator (URL) of a website. If it looks suspicious and/or does not have HTTPS do not send sensitive information over the internet.
  • If you are unsure whether an email pr text message request is legitimate, try to verify it by contacting the company directly. Do not use the contact information provided on a website connected to the request; instead, check previous statements for contact information.
  • Take advantage of any anti-phishing features offered by your email client and web browser.
  • Install and maintain anti-virus software, malware software, firewalls, and email filters to reduce some of the phishing traffic.

Eliminate Phishing

Stop being a victim of phishing attacks.

 

Related Articles

Achieve Zero Trust with Passwordless

Achieve Zero Trust with Passwordless

The acceleration of digital transformation has fueled the adoption of mobile and cloud technologies and we can no longer have a network perimeter-centric view of security. Instead, we need to securely enable access for various users – employees, partners, contractors, etc. – regardless of their location, device or network. We review how Passwordless authentication lays the foundation for a Zero Trust Architecture by providing the highest level security and a frictionless user experience.

3 best practices to keep critical infrastructure secure from cyberthreats

3 best practices to keep critical infrastructure secure from cyberthreats

Critical infrastructures have faced a barrage of cyberthreats in recent years, and operators now recognize that future attacks are a matter of ‘when’ rather than ‘if’. With 56% of the utilities network operators worldwide, reported at least one shutdown or operational data loss per year and 54% expected an attack in the coming year posses a major cyberthreat to energy and utility organizations. In this blog we explore 3 best practices that critical infrastructure sectors need to adopt to keep the malicious actors from a barrage cyberthreats.

3 Benefits of a Frictionless and Secure Digital Banking Experience

3 Benefits of a Frictionless and Secure Digital Banking Experience

Over the past decade the banking and finance industry has experienced a monumental shift that brought both unique challenges and opportunities for institutions all over the world.  Fast forward to today one thing is apparent – banks that choose to maintain the status quo simply will not be able to compete in a digitally accelerated landscape. In this blog we review the top 3 benefits of a frictionless and secure digital banking experience.

Stay up-to-date with the latest news and updates

Join our newsletter

Keep in touch with us and stay up-to-date on how you can protect your and your organization from identity-based attacks.

Get 12,000 free logins.

No credit card required.