Menu
 
Story Main Image
Which Side of the Hook are You on with Phishing?
Author Image
Posted July 21, 2020
Fraud happens every day, and fraudsters are getting more and more creative with their tricks. It’s important we are familiar with different types of fraud and how to prevent them.
What is it?
Story Segment Image
Phishing is a type of fraud that is practiced by sending deceiving emails impersonating another individual or a company to steal someone’s personal information. These emails come in different forms. They may have a link or document attached to them. The email they come from is meant to look as official as possible so the receiver doesn’t get suspicious. They could try to imitate an email of a coworker, from your company, or a company you may be interested in working with.
Why is it dangerous?
Story Segment Image
Fraudsters who phish are looking for information. They are looking for usernames and passwords to important things like your financial records, personal information, and credit card information. If you get a suspicious email at work, they could be looking for information in your company and are using your email to do it. Once you click on a link or open an email, whatever it is, the fraudster gains access to a lot of information.
How do I stop it?
Story Segment Image
Before opening an email, check out who the email is from. Do you recognize the name of the sender? Do you recognize their email? If they sent an attachment or link, don’t click on it, especially if it looks suspicious. Another helpful tip is to hover over links to see if it would actually take you to the website listed. If it’s at work, take a screenshot of the email and send it to your boss or security team. Make sure you don’t forward the email just in case it is a dangerous one.

A way to avoid this type of fraud is to keep your passwords secure and difficult to crack. Never write down your passwords next to your computer or laptop, if you have trouble remembering it, write down a hint. Try to change your passwords every so often and use different passwords for different websites and accounts.
Sources:
https://www.agingcare.com/articles/5-steps-to-take-after-clicking-on-a-phishing-link-178044.htm

https://blog.syscloud.com/types-of-phishing/
likes 0
comments 0
more