Cybercrime is a big deal; and phishing is behind a large percentage of the cyberattacks out there. The act of phishing is a good old-fashioned social engineering scheme. Basically, a scammer sends a message with the intent to have someone interact with the message, thus giving them access (or at least the information needed to gain access) to accounts. This month, we thought we’d briefly go through phishing messages and how to identify them.
Before we outline the four things you should be looking for to identify a phishing message, we wanted to say that these attacks can happen over any type of communication. You can just as easily be phished over the phone or through the mail as you can over email or through instant message. Most phishing messages are delivered through email, but they can come from any direction.
Let’s go through four variables of a phishing message:
While a lot of the messages that we get in business are demanding, there is something extraordinary about a phishing message. Essentially, phishing messages will urge the reader to take immediate action. This action could be in the form of clicking on links, downloading attachments, or giving over credentials that the hacker will then use to infiltrate organizational computing networks and steal data, deploy malware, or other negative situations.
Many of these messages are created with the notion that the reader will be fooled by the overall legitimacy of the message. Many times they are sent as being from financial institutions or insurance companies. Typically, however, there are signs within the message itself that can signal its illegitimacy. Variables like misspelled words, poor use of grammar, and other red flags can tip users that the message is not legitimate.
When someone sends an official email from a business, typically the domain name of the email address that is sending the email will represent the organization that the message is coming from. If the address doesn’t come from the organization that is sending the message, that is a giant red flag. Most reputable organizations pay good money to host their own domain and if the address you are getting a message from doesn’t represent that, you have to believe that it is a scam.
You know the type of messages that you typically get. If a message you receive doesn’t meet the criteria of “normal” you, at the very least, need to verify with the presumed sender of the message that it is legitimate. If it feels off, it probably is. Make sure you get this confirmation through a different means of communication.
Phishing messages are the most common way that hackers gain access to systems and deliver malware. As a result, you need to make sure that your staff is thoroughly trained on what variables to look for so they don’t put your whole organization in danger. For more information about phishing or to get some help implementing a training strategy at your place of business, give the IT professionals at IC Data Communications LLC a call today at (313) 887-1297.
Comments