MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can You Spot the Bait in a Phishing Attack?

Can You Spot the Bait in a Phishing Attack?

Hackers are always trying to find creative and new ways to steal data and information from businesses. While spam (unwanted messages in your email inbox) has been around for a very long time, phishing emails have risen in popularity because they are more effective at achieving the desired endgame. How can you make sure that phishing scams don’t harm your business in the future?

Phishing attacks come in many different forms. We’ll discuss some of the most popular ways that hackers and scammers will try to take advantage of your business through phishing scams, including phone calls, email, and social media.

Phishing Calls
Do you receive calls from strange or restricted numbers? If so, chances are that they are calls that you want to avoid. Hackers will use the phone to make phishing phone calls to unsuspecting employees. They might claim to be with IT support, and in some cases, they might even take on the identity of someone else within your office. These types of attacks can be dangerous and tricky to work around, particularly if the scammer is pretending to be someone of authority within your organization.

For example, someone might call your organization asking about a printer model or other information about your technology. Sometimes they will be looking for specific data or information that might be in the system, while other times they are simply looking for a way into your network. Either way, it’s important that your company doesn’t give in to their requests, as there is no reason why anyone would ask for sensitive information over the phone. If in doubt, you should cross-check contact information to make sure that the caller is who they say they are.

Phishing Emails
Phishing emails aren’t quite as pressing as phishing phone calls because you’re not being pressured to make an immediate decision. Still, this doesn’t lessen the importance of being able to identify phishing messages. You might receive tailor-made customized phishing messages with the sole intent of a specific user handing over important information or clicking on a link/attachment. Either way, the end result is much the same as a phone call phishing scam;

To avoid phishing emails, you should implement a spam filter and train your employees on how to identify the telltale signs of these messages. These include spelling errors, incorrect information, and anything that just doesn’t belong. Although, phishing messages have started to become more elaborate and sophisticated.

Phishing Accounts
Social media makes it incredibly easy for hackers to assume an anonymous identity and use it to attack you; or, even more terrifying, the identity of someone you know. It’s easy for a hacker to masquerade as someone that they’re not, providing an outlet for attack that can be somewhat challenging to identify. Some key pointers are to avoid any messages that come out of the blue or seemingly randomly. You can also ask questions about past interactions that tip you off that they may (or may not) be who they say they are.

Ultimately, it all comes down to approaching any phishing incident intelligently and with a healthy dose of skepticism. To learn more about how to keep your business secure, reach out to us at (757) 420-5150.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, July 20 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Network Security Business Computing Hackers Malware Software Productivity Internet Hosted Solutions Managed IT Services Backup Business Management Mobile Devices google Computer Disaster Recovery Outsourced IT Microsoft Business IT Support Hardware communications VoIP Business Continuity Windows 10 Innovation Cybersecurity IT Services Email User Tips Efficiency Data Backup Cybercrime Tech Term Windows Managed IT Mobility Saving Money Mobile Device Management Data Recovery Server Ransomware Internet of Things Small Business Apps Operating System Data browser Productivity Law Enforcement Smartphone Android Virtualization Office 365 BDR Money Telephone Systems Save Money Quick Tips Passwords Phishing Smartphones Cloud Computing Data Security Hosted Solution Communication Microsoft Office IT Support BYOD Automation VPN Managed Service Provider Password Information Technology Holiday Recovery Network Chrome App Work/Life Balance Cost Management Collaboration Wi-Fi Hacking Application Google Drive Avoiding Downtime Facebook Alert Government Health Miscellaneous Computers Vulnerability Update Two-factor Authentication Gadgets Workplace Tips Wireless Social Media Best Practice Data Breach Risk Management Unsupported Software Budget Data Management Social upgrade Tech Support search Shortcut Data Protection Wireless Technology Router Firewall Antivirus Blockchain User Error Current Events Telephony Audit Compliance Gmail Personal Information Private Cloud Office tips Applications History Spam Politics Remote Computing Proactive IT Cleaning Managed IT Services USB Save Time The Internet of Things Social Engineering Users Employer-Employee Relationship Streaming Media Identity Theft Artificial Intelligence Flexibility Going Green Bandwidth Hacker Internet Exlporer Education Solid State Drive eWaste Vendor Management SaaS Redundancy Management Samsung Travel iPhone Commerce Content Filtering Battery Mobile Computing HaaS Cortana Mobile Security Transportation Patch Management Devices Windows 10 Robot Automobile Google Assistant Value End of Support IT solutions Wireless Charging Excel Fraud Saving Time Data Storage DDoS Office Computer Care OneNote Phone System Humor Television Disaster Networking Legal Encryption Apple Project Management Data Loss Marketing Sports WiFi MSP Google Docs Big Data Managing Stress Conferencing Content Filter Hard Drives HBO Webinar Files Microsoft Word Students Mobile intranet Microsoft Excel Computing Remote Monitoring Administrator Books Lithium-ion battery Scalability remote Yahoo Gifts Monitoring Hiring/Firing IT solutions Unified Communications Professional Services IT budget File Sharing Analysis Relocation Access Running Cable How To Server 2008 Ali Rowghani IT Management Maintenance Benefits Windows 10s Nanotechnology Trending Financial Storage App store Unified Threat Management Credit Cards Financial Technology PDF WIndows Server 2008 Device Security Hard Disk Drive Training Root Cause Analysis Entertainment Bring Your Own Device Tablets Identities server installation dvd "cannot install required files" Upgrades Electronic Medical Records Point of Sale stock FAQ Printing Text Messaging IoT Company Culture Augmented Reality HIPAA Hybrid Cloud NFL Lifestyle Identity Consultant Business Intelligence Safety Touchscreen Black Market tweet Charger Outlook Spyware Smart Technology Word Language Avoid Downtime Business Technology calculator Legislation Data Privacy Managed IT Service Shadow IT iOS Uninterrupted Power Supply Document Management Twitter Computer Forensics Laptop Windows Ink Experience Wasting Money control Comparison Hard Drive Computer Fan WSJ Evernote PowerPoint Regulation Edge Touchpad Google Maps Virus Reputation Video Games Amazon Exchange Virtual Reality altivista Specifications Chromebook Advertising Screen Mirroring Distributed Denial of Service Scam Dark Web Wireless Internet Sync Ciminal Software as a Service Proactive Meetings Music Virtual Assistant SBS compaq Sales Smart Tech Cast Data storage Emails Employer Employee Relationship Workers Gamification Adobe Websites Administration Settings Chromecast Analytics Wearable Technology Alexa for Business Instant Messaging hp Retail Connectivity Keyboard Computer Accessories WannaCry Worker Commute Updates Memory Licensing Data Theft Colocation Mobile Device domain Monitors Thank You Congratulations Emergency CrashOverride Worker Cache

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...