Phishing 101

by Enstep Team | Feb 21, 2011 | Articles

What makes a phishing message tick? Identify phishing messages from the get go and stop yourself from becoming another statistic.

Online oracle Wikipedia defines phishing as: “the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.” We probably don’t need to tell you what kind of damage unscrupulous people can do with that kind of data in their hands. This is why it’s important to identify phishing messages from the get go and prevent becoming a victim.

What makes a phishing message tick? How are they different from spam? What makes phishing different from spam is that phishing messages masquerade as official correspondence from a trusted source. While spam can be filtered, many phishing messages manage to bypass these filters precisely because they seem to be legitimate messages. They can be disguised as communication from your bank, your credit card company, or even from a large company such as Microsoft or Google, or social networking sites like Facebook, or MySpace. These messages come complete with official-sounding content and even logos stolen from the legit websites.

The website links in the message, however, direct you to a fraudulent but official-looking website where you are asked to divulge personal information. You can check these links by simply hovering your mouse pointer over them – watch out for misspelled or faked / masked websites.

Sometimes a telephone number is posted, and when called, you are asked for personal information. Remember, legitimate companies never ask for your password or similar data.

Another identifying factor: phishers bait people with everything from ultimatums (such as a deadline or expiry date) to shocking statements (such as, “you’ve won a hundred thousand dollars!”). These kinds of phrases are designed to create a sense of urgency, making users fill out forms and click on links without fully considering the consequences.

If you want to know more about phishing and how you can safeguard yourself against it, we’ll be happy to fill you in and discuss a customized security plan to keep you fully protected.

Published with permission from TechAdvisory.org. Source.

Related Posts

5 Easy Ways to Ensure Customer Satisfaction

5 Easy Ways to Ensure Customer Satisfaction

When it comes to running a business, popular wisdom says that “the customer is always right.” While this may not hold true in every case, the idea behind it endures.  The customer may not always right, but their satisfaction is necessary for your success.  When...

7 Things to Look for in a Virtual Assistant

7 Things to Look for in a Virtual Assistant

Your busy schedule may have you thinking about hiring an assistant. A virtual assistant is a cost-effective and efficient option to consider. Since you don’t have to provide office space, it’s cheaper than hiring someone on-site. Use this guide as you search for the...

Technology Trends: What to Expect in 2017

Technology Trends: What to Expect in 2017

A new year always brings new predictions for what will be trending and what we can all look forward to in the news, politics, entertainment, and more. In the world of technology, innovations and advancements are a fast, steady stream as developers make everything...

FIND OUT WHAT YOUR BUSINESS SHOULD EXPECT TO PAY
FOR HOUSTON TECH SUPPORT

Give us a call and discover how great local IT services and computer support can be!