
Online Threats 101 – What is “Phishing”?
We’ve all heard of computer threats like ransomware, malware, “bugs”, along with numerous other terms for threats floating around the internet. Every day, scammers online become more creative in their efforts to steal information from unsuspecting users – it’s critical that business leaders are prepared to recognize and respond to these threats.
Phishing is a form of data theft that disguises itself to lure victims into giving out personal and company information. This simple trick can lead to major breaches in security and damages totaling thousands (to even millions) of dollars.
How exactly does Phishing work?
Users online who attempt to steal data will send bait through email, online messaging systems, or even text messages. They can pose as friends, coworkers, other businesses, or anyone who would appear trustworthy at first glance. Attempts may ask for verification of certain credentials, or even prompt users to interact with a link to malware or another virus. Some send malicious attachments, asking users to open files that will also infect their computers.
Phishing attempts may go unnoticed by those with an untrained eye. Most, however, will contain glaringly obvious details that will clue recipients into their true intentions. Some signs to look out for include errors in spelling/grammar or unusually urgent calls to action.
Forms of Phishing
Phishing, like most online threats, has evolved into many forms to allow for the most scam attempts across channels. Some types of phishing now include:
- Email Phishing – one of the most common forms of phishing; suspicious users send mail asking for personal information or send malware through links or attachments
- Spear Phishing – phishing that’s targeted towards groups or individuals in a business, usually involving prior research to appear more legitimate to the victims
- “Vishing” (Voice Phishing) – common telephone scams posing as trusted institutions looking for credit card or banking information
- SMS or Text Phishing – like email phishing; users are prompted to follow links or provide information over SMS
Phishing and the Role of MSPs
Managed IT service providers offer resources for companies looking to increase their defenses against phishing and other cyberattacks. By completing security audits, overhauls, and installing the correct software to counteract the evolving tactics used by hackers, they allow for a greater sense of security and take pressure off any in-house IT staff.
American Lazer – CommSat is a local leader in managed IT services and cybersecurity defense. To learn more about our packages and services, click the link here or email us at [email protected].