Skip to main content

Phishing Email and how not become it's victim.

 

Phishing is a technique used to extort personal information such your passwords or credit card numbers and other personal data.

This consists of pretending to represent companies, brand or business organizations  you are users, account member or prospective buyers. This messages will ask you open webpage using the link provided and ask you to provide personal information yourself. These page links are redirected to fake pages which look alike original business website pages. When you log in to that page, the cybercriminals can steal your credentials.

Further, they can use your username and password I to login and  could start sending unsolicited messages (spam) in your name and gain access to your contacts for more unsolicited access.

Often, they target to mimic as financial institutions or e-commerce site where they can get access to credentials of your banking or your credit cards. Also, various contest winning or free wealth share messaging to get you excited and provide your personal data as well as small fee to claim that prize.

There are various methods and ways these cyber crime artists use to get access of information simply by convincing you to provide them willingly.

Fortunately, most of this phishing emails are caught and blocked by mail servers but various email still escape and reach out to users. There are various key information which can help you identify phishing and prevent from being a victim.

Signs of a phishing attempt? Look for:

  • Poor vocabulary or incorrect spelling
  • An action you are not aware of – purchasing item , contest ticket purchase
  • Send email is spoofed and not send by actual company domain website
  • An e-mail sent by a service provider you do not know, or from a company with which you do not do business
  • An e-mail telling you your account has been deactivated
  • An e-mail asking you to confirm personal information quickly, and threatening to deactivate your account
  • Asking you click a link provided on the email

 


When unsure, what to do ?

  • Do not use the link provided, go to website directly using typing actual website address
  • Do not reply that email or call on number provided, instead  use already known phone number to call and confirm and known email for clarification
  • Contact actual company or service provider to confirm about emails
  • Copy part of email message and paste on Google (or other) search engine to search if others received such emails

 

When in doubt, assume it as phishing email and contact actual company or share email details with friends or contact cyber security blogs for support. Learn more at estiopi.cybersafe@solnetcanada.com

Comments

Popular posts from this blog

Business Phone System ( Managed VOIP PBX)

  Business Phone System ( Managed VOIP PBX) Phone systems for business is no longer just  a tool for making and receiving calls. It's an important tool to connect and collaborate with team members and customers using audio, video, text, file sharing, conference calls and more with flexibility to be able to communicate while at office, working from home or off-site or at away location. For most businesses, their phone is their primary point of contact with their customers. Any disconnection or call drops or issues with the phone system  means your business is missing out  from current and potential customers, and you are at the complete  mercy of the traditional  telecom service provider while you wait for your service to be restored. Typically, businesses implement  a phone system in the work environment  to connect and collaborate. For the longest time businesses have been choosing what's available or been referred or been approached  at that given time and once a working syst

CYBERSECURITY BASIC TIPS - How to protect yourself from hacking ?

Work from Home and Remote Access for Small Business

  Work from Home and Remote Access for Small Business   This pandemic has taught us many things and one of those things includes being flexible and adaptable in business. Not all business has opportunities to be completely flexible and adaptable according to business situations but all business has certain avenues to do so. Adaptability can be seen as being lean in operations, reduce overhead costs, revisiting technology and recurring expenses, offering employee flexibility, entering into online marketplace, creating digital presence and marketing, reducing maintenance costs are to name a few. If researched properly, many businesses needs just few small steps can help cover the basics and make business more flexible to be adaptable. Every business is different with varying scope of changes. Many businesses which are office based, who share common space and technology to perform day to day tasks. A work from home setup is very fruitful for those businesses as it allows to be lea