Three tips to protect yourself against phishing
2022. May 17.

[vc_row][vc_column][vc_column_text]- What is common in our grandmother, granddaughter, boss, Elon Musk, and well-known banks?

– Well, … phishing-like cyber-attacks are committed in the name of all of them. Thus, our families, our employers and our own companies could become victims of multi-million-dollar scams. In four paragraphs, this article outlines the main types of phishing attacks and the simplest strategies to defend against them.

*

Phishing in a new era

Phishing is a type of cyberattack, by which cybercriminals steal confidential information from us by sending deceptive messages, the preys of phishing could be:

Furthermore, cybercriminals can use our personal data to build huge databases, that they can sell or re-use for a later attack. By obtaining our most personal data, such as our sexual orientation, religious and political views, cybercriminals can create even more sensitive decoys for us.

It is worth mentioning that researchers from Stanford University and the University of Cambridge showed back in 2011 that our activities on social media platforms – the vocabulary of our posts, our likes and emoji usage – are good approximators of our psychological pattern, wherewith outsiders can predict our purchasing preferences and political thinking too. With data analytics techniques based on Artificial Intelligence (AI), we have entered an era where our privacy is eroding: every piece of data we publish, contributes to a more accurate behaviouristic picture of our actions and motivations. What is more, communication strategies based on such analytics can also influence the development of our personality, – warns us Harvard University professor Shoshana Zuboff. Thus, with data analytics techniques based on AI, it is not only possible to analyse our political thinking or consumer preferences, but it is also much easier to produce messages that we are more likely to click on.

Types of phishing activities

Cybersecurity experts classify phishing attacks in several ways. For example, there are three groups of attacks based on the size and focus of their targets:

In addition to focus groups, we should also pay attention to attack strategies.

Although, many phishing activities is done via email, it’s good to know that other channels and online platforms are also being weaponized by cybercriminals:

*

Few examples around the globe

To see the similarities between the scams, it is worth looking at a few reports of actual cases:

Three tips to protect yourself against phishing

  1. Panic, haste, and greed are the worst advisors!
    Don’t rush! Think twice about every click. And ask yourself the naivest questions possible.
  2.  Don’t overlook suspicious signs!
    Look carefully: Which email address is the sender writing from? Have we received emails or SMS from this address before? If the sender was indeed my colleague, why didn’t she contact me personally or use another channel? Why is my bank calling from a hidden number? Who writes an email at 2am? Is this e-mail official, why is it not signed with the usual digital signature? Why would anyone offer such a good financial deal?
  3. Be aware of your own emotions!
    Offensive messages and calls often put us in uncomfortable situations. Technical terminology that is difficult to understand for the average user can be frustrating, and embarrassing. Therefore, we may not even think about why we should act so quickly. But whose fault this level of miscommunication?

In situations of uncertainty, good questions to ask might include the followings: What does this discount say on my bank’s website? Does this phone number match the one on my bank’s website? Wouldn’t it be better to ask in person tomorrow? If this update is so important, why was it not announced weeks ago? Is this update necessary, or should I call the administrator team?

It’s important not to give out your personal details on the phone, for example, it is better to ask for a call back as a time delay! No late fee is more painful than losing control of your current account.

*

The slightest suspicion or uncertainty is better luck than being the victim of an attack. If you feel that your company needs data protection and information security trainings and technology solutions, please contact us.

[/vc_column_text][/vc_column][/vc_row]

The above summary is provided for information purposes only. We recommend that you consult our experts before making any decision based on this information.