• Start Your Digital Transformation Now!
  • Start Your Digital Transformation Now!

Phishing: The Silent Cyber Threat You Can’t Afford to Ignore

Phishing Scams, online security
  • February 15, 2023

Heather Peyton

Is phishing that big of a threat? Can a scammer get much data from me? What is phishing anyway? What else should I know about it, and how can I keep myself safer?

      Are you underestimating the dangers of phishing? Think again. Phishing isn’t just about losing a password; it’s about losing control of your identity. Scammers deploy various tactics—emails, texts, calls—to extract sensitive data like addresses, social security numbers, and passwords.

      Phishing is a type of cybercrime that targets possible contacts via email, text message, telephone, or even fake websites where the person is posing as a person from a legitimate company/institution to trick a person into releasing their personal information. This information can be anything that could grant them access to all your personal/business information:

      • Address

      • Phone number

      • Social security number

      • Date of birth

      • Passwords

      • Credit card numbers

      • Banking information

     

    Those are just a few items a phishing attempt might try to get from its victims. Once this information is in their grasp, they can use it for whatever they want. 

                    The phishers commonly use fear, urgency, and money tactics to scare someone into giving them their private information. They make it sound like your account is suspended or your order will not be received unless you verify all your information. It could also be along the lines of how your payment information must be incorrect, and you will have to re-enter it via the link provided. Please do not ever use the provided links! When in doubt, always go to the site/company yourself to verify that there is a problem and update it directly with them.


    EMAIL PHISHING

    Email phishing can also result in Malware being installed on your device. This is done when the email has an attachment of some sort, like an unpaid invoice, that is for the victim to click, which is not an actual invoice, and once it is clicked, the file has now infected your device with the Malware. 

    Email phishing can be in the form of attaining your login information. This email is about how you must “Your account has been COMPROMISED; follow the provided link to log in and reset your password NOW!” This is where you should go to that website yourself, not via the link provided, and make sure you update what you need to update if you genuinely think that has been an actual data breach.

    Check out the writing in the circled area of the picture from an email that was received. This is not a legitimate email from Amazon, and if you want to make sure, you can always log in to the Amazon website to verify your account with them.

     

    TEXT PHISHING

          Text phishing is a real problem, and the phisher will try anything to get you to give them your information.

    Like my text of how I “missed my delivery guy Michael and how he would like to get me my package,” he would like for me to click the link to confirm when he can come back. Well, sorry, Michael, I do not have a package being delivered, so you will not be getting me to click. The delivery driver would not text you; a company like UPS, if you signed up for their notifications, might, but not the driver. Plus, look at the link; he wants the confirmation from, well, that does NOT look like a legitimate link.

    This text I received was on the same line; I am not getting my delivery after three attempts! Oh no, the package I could have been waiting for isn’t going to be delivered!

    If you do have an expected delivery, go to the company you have ordered from and check your order there. Do NOT fall for the tricks and become a victim of fraud.

     

    TELEPHONE PHISHING

    This type of phishing is usually done by a person from the respected company XYZ, and something is wrong with your account or payment. My favorite is when the FBI calls because someone in another state far from me is using my social security number: “Please verify your social, so we know we have the right person,” and you will be arrested. Well, if you are telling me they are using my social, then why will I provide you with it or verify that it is my social security number?

    Like the “car warranty” calls, what if you don’t own a car or your car is ten years old? Please keep mindful of what you are giving a stranger by phone. Do not verify any information that they might have on you or that you are providing to them. If you believe you are in trouble, contact the company that is calling you by dialing the number you have for that company, not one that the person provides on the phone.

     

    The consequences? Devastating. From compromised devices to financial ruin, phishing attacks spare no one. Imagine the fallout of a ransomware attack on your work PC or unauthorized purchases made with your credit card.

    So, how can you protect yourself? Stay vigilant. Verify the authenticity of all communications and never share sensitive information, including passwords (needing password help, read our blog on passwords) unless you’re confident of the recipient’s identity. Report suspicious activity and educate yourself on the latest phishing tactics.

    Remember, your security is in your hands. Don’t let phishing reel you in—stay informed, stay cautious, and stay safe in the digital realm. Your identity depends on it.

    NextNext

    more insights

    Multi-Factor Authentication (MFA)

    Cybersecurity: A Guide to Multi-Factor Authentication (MFA)

    Heather Peyton February 19, 2024

    In our increasingly interconnected world, where our digital presence grows daily, safeguarding our online identity has never been more critical, do you know about Multi-Factor

    Read more >
    Password security, security, password protection

    Mastering Password Security: Protecting Your Digital Fortress

    Heather Peyton February 19, 2024

    Protect your digital fortress with robust password security practices. Learn how to craft strong, unique passwords, embrace passphrases, and utilize password managers effectively. Safeguard your sensitive information from cyber threats and mitigate the risks of password compromise. Start mastering password security today for a safer online experience.

    Read more >
    Online Security picture

    Navigating the Digital Frontier: Safeguarding Your Online World

    Heather Peyton September 27, 2023

    In an era where our lives are increasingly intertwined with the digital world, the importance of online security cannot be overstated. The digital landscape is

    Read more >
    • Home
    • Contact Us
    • Home
    • Contact Us

    Get In Touch

    • Email:    hello@confluxcloud.tech
    • Phone:   513-318-4890
    Follow us
    Linkedin Facebook
    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}