My last post detailed the ways in which modern scammers are evolving their attacks to target individuals based on personal information gathered from online locations such as social media. Armed with these new techniques, scammers have become even more dangerous as they prey on users’ trust and instincts in ways that are hard to ignore.
Our desire for convenience and our need for urgency can put us at risk when exploited by scammers.
Four Strategies Used in Phishing
The most important step you can take to avoid falling victim to modern phishing techniques is to stay vigilant. While there is no guaranteed “giveaway” sign in every single phishing message, scam messages often have common elements that can alert you to a problem.
Top 7 Ways to Spot a Phishing Email
Be aware that not all phishing happens online; phishing scams also come via phone calls:
The Attack
Someone claims to represent your personal computer’s service department saying that your computer has reported a problem to them via the internet. They are looking for your service agreement number or credit card number to begin solving the reported problem. Once they get this information, the abuse of that account begins.
The Defense:
Trusted providers (i.e. Banks) would not ask that information via phone. A best practice is to hang up and call the provider’s official phone number instead to make sure the call really originated from them
In the end, YOU are responsible for your own cybersecurity. The more active you are online, the more connected you are, the more you need to take precautions to protect your personal information from being exposed. The time it takes to prevent a phishing attack is often frustrating; however, it is far outweighed by the time (and money) needed to recover from an information breach.
R.L. (Rick) Gorskie | Global Sales Manager - Cybersecurity
Emerson Automation Solutions | 1100 W. Louis Henna Blvd. | Round Rock | Texas | USA | 78681-7430Rick.Gorskie@Emerson.com
Rick Gorskie
Global Sales Manager - Cybersecurity
Emerson Automation Solutions