Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Let’s Take a Look at Phishing Attacks

Let’s Take a Look at Phishing Attacks

Phishing attacks are growing in number and it presents a major challenge for businesses. The many different forms that these attacks come in just exacerbates the problem. Today, we will take a brief look at phishing to help you educate your staff on what they entail and how to mitigate the massive risk that comes with them. 

Phishing Attacks

A phishing attack comes in as communication from a trustworthy source as to fool the recipient to interact with it. This could be in the form of an email, a text message, a phone call, or really any other form of direct communication. The goal is to manipulate the recipient into providing access credentials to network-attached resources so they can steal data or deploy malware. 

Since phishing can come in several different forms, it is an effective way to breach your network defenses because the scammers are given access, they don’t have to try and outright breach your network defenses, which in many cases are extremely hard to hack into. Let’s take a look at some of the ways these scams are disseminated.

Business Email Compromise

In a business email compromise scam, the scammer will send an employee an email that, at first glance, comes from an authority figure inside of the business. The messages will be quite vague, but direct the recipient into taking some type of action that will allow the hacker to gain access to resources. Many employees will not think twice when their manager tells them to complete a task, so phishing attacks of this type are successful because people don’t take the time to ascertain that the message isn’t actually from anyone. 

Hackers use this method because they work. In Q2 of 2020, successful business email compromise scams averaged $80,193. 

Clone Phishing

One of the most successful phishing scams is using a clone of a message a recipient would have seen before. By gaining access to data beforehand, the hacker can customize a message that looks like one they have received previously. Typically, this type of familiarity removes any suspicion that the message is actually from a scammer. The links are altered to reroute to a site where scammers collect more information. Pretty crafty way to steal credentials. 

Smishing

Email may be the predominant way that phishing is pushed to people, but it isn’t the only way. Smishing attacks are carried out through text messaging. Most people are much less careful about opening and interacting with text messages than they are with their email, and as a result scammers have started pushing phishing messages that look like legitimate messages through SMS. If you also consider that mobile devices often don’t uphold the same security standards that PCs do, users are more vulnerable through an SMS attack. 

Spear Phishing

The spear phishing attack is probably the most dangerous of the phishing scams. First of all it is deliberately designed for a single user. The hacker, in this case, has already done their due diligence and chose their target based on information they already have about the target. Since these attacks take more time to properly execute, spear phishing is typically carried out against high-value targets. The success rate of these attacks are significantly higher than your average, run-of-the-mill phishing attack

Vishing

Another take on phishing, vishing is just phishing over the phone. A scammer will call a target under the guise of a salesperson or finance professional, and because of their perceived legitimacy, the scammer can typically extract information that will help them gain access to computing resources, or at the very least the target's personal or financial information.  

Whaling

Whaling is a phishing attack, typically a spear phishing attack, aimed at business owners, decision makers, and executives at businesses. These attacks, because they are aimed at people who have access to everything, often are well planned; and, if successful often result in the biggest bounty for the perpetrator.

Phishing is a Serious Threat

You need to have a strategy in place to combat phishing as it is not going anywhere, anytime soon. If you would like to talk to one of our consultants about developing a plan to train your people about phishing attacks and what to do if they come across one, give us a call at 800.618.9844 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 21 December 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet Efficiency IT Support User Tips Malware Email Privacy Phishing Workplace Tips Google Computer Users Collaboration IT Services Hosted Solutions Mobile Device Ransomware Quick Tips Cybersecurity Small Business Microsoft Workplace Strategy Data Backup Communication Smartphone Business Management Smartphones VoIP Android Saving Money Mobile Devices communications Data Recovery Passwords Backup Managed IT Services Managed Service Browser Social Media Microsoft Office Upgrade Disaster Recovery Tech Term Network Internet of Things Remote Automation Facebook Artificial Intelligence Covid-19 Cloud Computing Windows Miscellaneous Gadgets Remote Work Server Managed Service Provider Outsourced IT Productivity Information Current Events Spam Encryption Employee/Employer Relationship Windows 10 AI Holiday Compliance Business Continuity Office Government Data Management Business Technology Virtualization Blockchain Wi-Fi Training Windows 10 Two-factor Authentication Bandwidth Apps Data Security Mobile Office Managed Services Voice over Internet Protocol Chrome Budget Employer-Employee Relationship Networking Apple Vendor App Mobile Device Management Gmail Conferencing Office 365 Tip of the week WiFi How To BDR Hacker Applications Avoiding Downtime BYOD Computing Information Technology Access Control Healthcare Analytics Office Tips Big Data Augmented Reality Retail Storage Password Managed IT Services Bring Your Own Device Computers HIPAA Router Website Marketing Operating System Help Desk Virtual Private Network Risk Management Health Remote Workers The Internet of Things Telephone Document Management IT Support Social Cooperation Free Resource Project Management Scam Windows 7 Data loss Microsoft 365 Customer Service Solutions Patch Management Save Money Remote Monitoring Going Green Vulnerability End of Support Vendor Management Windows 11 Cybercrime Monitoring 2FA Display Firewall Printer Excel Paperless Office Infrastructure Safety Virtual Desktop LiFi Data storage Managed IT Service Machine Learning Downloads Outlook iPhone Licensing Money Entertainment Humor Vulnerabilities Maintenance Data Privacy Antivirus Images 101 Customer Relationship Management Sports Telephone System Multi-Factor Authentication Mouse Mobility Cost Management Hacking Administration Presentation Employees Robot Integration Wireless Technology User Tip Modem Mobile Security Settings Processor Wireless IT Management Printing Content Filtering VPN Holidays Meetings Word Physical Security Data Storage YouTube Smart Technology Supply Chain Computer Repair Cryptocurrency Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Regulations Compliance Identity Websites Google Wallet Evernote Paperless Bookmark Smart Tech Memes Undo Co-managed IT Alerts SQL Server Technology Care Electronic Medical Records Windows 8 Laptop SharePoint Download Net Neutrality Financial Data History Drones Business Communications Writing Browsers Smartwatch Lenovo Connectivity IT Break Fix Scams Azure Hybrid Work Virtual Reality Halloween Upload Procurement Social Network Telework Server Management Cyber security Application Private Cloud Multi-Factor Security Tech Human Resources CES Superfish IoT Communitications Identity Theft Dark Web Cables Twitter Hacks Scary Stories Trends Supply Chain Management IBM Fun Customer Resource management FinTech Regulations Error Google Calendar Term Google Apps Social Engineering Deep Learning Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Staff Value Business Intelligence Remote Computing Gamification Flexibility Organization Social Networking Legislation Shortcuts Education Fileless Malware Digital Security Cameras Smart Devices Competition Tablet Ransmoware Content Remote Working Wearable Technology Memory Vendors Alert Mobile Computing Search Health IT Managed IT Motherboard Data Breach File Sharing Comparison Google Play Be Proactive Dark Data Permissions Workforce How To Best Practice Directions Videos Assessment Electronic Health Records Wasting Time Threats User Notifications Buisness IT solutions Trend Micro Travel Legal Specifications Security Cameras Workplace Strategies Fraud Meta Business Growth Microchip Techology Internet Exlporer Software as a Service Google Maps Username IP Address Managing Costs Amazon Cortana eCommerce Unified Threat Management Black Friday SSID Virtual Assistant Outsource IT Alt Codes Unified Threat Management Database Surveillance IT Technicians Virtual Machine Environment Recovery Media Downtime Hosted Solution Proxy Server Reviews Cookies Hard Drives Cyber Monday Medical IT Network Congestion Hotspot Transportation Small Businesses Typing User Error Tactics Development Domains Mirgation Hypervisor Displays Knowledge Shopping Nanotechnology Optimization Refrigeration Point of Sale Google Drive PowerPoint Language Employer/Employee Relationships Outsourcing Addiction Public Speaking 5G Management PCI DSS Lithium-ion battery Network Management Chatbots Tech Support Navigation Unified Communications Experience Gig Economy Screen Reader Google Docs Distributed Denial of Service Workplace Entrepreneur Monitors Computing Infrastructure Teamwork Hiring/Firing Bitcoin Running Cable Service Level Agreement Internet Service Provider

Blog Archive