top of page
  • Writer's pictureCharles Davidson

Phishing: Are You Protected?

The attempt to fraudulently gather sensitive information from you by attempting to disguise oneself as a trusted entity is known as phishing. Phishing usually is attempted by scammers to try to obtain information such as passwords, usernames, payment methods, and more.

A relatable example of a phishing email can be as simple as Netflix sending you a reminder to update your payment information, but when you look closely at the sender, you realize it’s not Netflix actually asking you for that payment information. Phishing is simply a cyber criminal posing as a trusted source giving you reason to enter personal information with intent to use it.

Where to Lookout for Phishing

As people become increasingly attached to the internet,our chance of encountering risks of phishing is also on the rise. E-mails are the most common phishing scams known, but you can be at risk to phishing as well through voice, text, or web pages.

Most Common Phishing Emails

There are endless prompts and attempts that a cyber criminal may use to gather your information, so it is important to always be very careful with keeping track of what emails you choose to open and trust.

Here are some common prompts used by attackers so you make sure to look over similar emails extra carefully in the future:

  • Update needed for payment method.

  • Claims of suspicious activity or log-in attempts.

  • Invoices or receipts.

  • Confirming answers to security questions.

  • Clicking on a link requiring a payment.

  • “Free” or Special Offers.

  • Confirming login credentials.

Phishing and Business

The workplace is a very vulnerable place for phishing scams. Companies cannot rely on employees being able to sort through every email and be able to accurately judge it’s safety. Standard email or web filters cannot work to block well made phishing sites or emails, so that is where TierTek can step in and help setup security measures to protect your company. If your employees fall victim to phishing, the cost can be completely devastating. Your employees falling victim to a phishing scam could lead to the loss of reputation of your brand or corporate network security.

Tips to Protect Phishing

Here are some of the most common recommendations to help protect yourself from this cyber crime:

  • Always be cautious about emails and other forms of communication you receive and open.

  • Before trusting a message or prompt, ensure all the domains, links, spelling is correct and direct.

  • Use multi-factor authorization for accounts when possible.

  • Set mobile devices so their software updates automatically so they are up to date with all security precautions.

  • Hold your mouse over a link to see the source before you click it.

  • Use security software to protect devices and yourself.

  • Never enter personal information in pop-ups.

  • Do not open suspicious attachments or links.

  • If you are suspicious an email is not from the source it claims it is, contact this entity directly with credentials you know are real.

In Conclusion

Most phishing scams aren’t as obvious as a Nigerian prince wanting to send you his two million dollar inheritance for a shipping fee, so it is important to be on your toes and to always stay secure and keep your employees secure and aware when browsing the web. If you want to know what TierTek can do to protect you and your business, please contact us anytime to discuss service options that will help protect your assets.

19 views0 comments


bottom of page