MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can You Spot the Bait in a Phishing Attack?

Can You Spot the Bait in a Phishing Attack?

Hackers are always trying to find creative and new ways to steal data and information from businesses. While spam (unwanted messages in your email inbox) has been around for a very long time, phishing emails have risen in popularity because they are more effective at achieving the desired endgame. How can you make sure that phishing scams don’t harm your business in the future?

Phishing attacks come in many different forms. We’ll discuss some of the most popular ways that hackers and scammers will try to take advantage of your business through phishing scams, including phone calls, email, and social media.

Phishing Calls
Do you receive calls from strange or restricted numbers? If so, chances are that they are calls that you want to avoid. Hackers will use the phone to make phishing phone calls to unsuspecting employees. They might claim to be with IT support, and in some cases, they might even take on the identity of someone else within your office. These types of attacks can be dangerous and tricky to work around, particularly if the scammer is pretending to be someone of authority within your organization.

For example, someone might call your organization asking about a printer model or other information about your technology. Sometimes they will be looking for specific data or information that might be in the system, while other times they are simply looking for a way into your network. Either way, it’s important that your company doesn’t give in to their requests, as there is no reason why anyone would ask for sensitive information over the phone. If in doubt, you should cross-check contact information to make sure that the caller is who they say they are.

Phishing Emails
Phishing emails aren’t quite as pressing as phishing phone calls because you’re not being pressured to make an immediate decision. Still, this doesn’t lessen the importance of being able to identify phishing messages. You might receive tailor-made customized phishing messages with the sole intent of a specific user handing over important information or clicking on a link/attachment. Either way, the end result is much the same as a phone call phishing scam;

To avoid phishing emails, you should implement a spam filter and train your employees on how to identify the telltale signs of these messages. These include spelling errors, incorrect information, and anything that just doesn’t belong. Although, phishing messages have started to become more elaborate and sophisticated.

Phishing Accounts
Social media makes it incredibly easy for hackers to assume an anonymous identity and use it to attack you; or, even more terrifying, the identity of someone you know. It’s easy for a hacker to masquerade as someone that they’re not, providing an outlet for attack that can be somewhat challenging to identify. Some key pointers are to avoid any messages that come out of the blue or seemingly randomly. You can also ask questions about past interactions that tip you off that they may (or may not) be who they say they are.

Ultimately, it all comes down to approaching any phishing incident intelligently and with a healthy dose of skepticism. To learn more about how to keep your business secure, reach out to us at (757) 420-5150.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 22 April 2018

Captcha Image

Tag Cloud

Security Tip of the Week Best Practices Technology Privacy Cloud Business Computing Network Security Hackers Malware Software Internet Hosted Solutions Backup Productivity Business Management Managed IT Services google Computer Microsoft Mobile Devices VoIP Disaster Recovery Outsourced IT Business Continuity Business communications IT Support Email User Tips Windows 10 IT Services Hardware Productivity Innovation Efficiency Cybercrime Apps Server Ransomware Cybersecurity Mobility Mobile Device Management Data Backup Windows Managed IT Small Business Data Smartphone Operating System browser Virtualization Data Recovery Law Enforcement Internet of Things Save Money Saving Money Telephone Systems Android Phishing Hosted Solution Passwords Quick Tips Data Security BDR Cloud Computing Money Chrome Information Technology Communication Recovery Smartphones VPN Office 365 Microsoft Office Password Holiday BYOD Risk Management Collaboration Automation IT Support Unsupported Software Alert Health Miscellaneous Managed Service Provider Computers Social upgrade Work/Life Balance App Vulnerability Best Practice Wi-Fi Social Media Tech Term Budget Facebook Data Management Government Two-factor Authentication Update Wireless Gadgets Google Drive Hacking Avoiding Downtime Telephony Social Engineering Identity Theft Flexibility Applications Private Cloud Office tips Shortcut History Windows 10 search Proactive IT Spam Firewall Application The Internet of Things Antivirus Current Events Managed IT Services Audit User Error Data Breach Personal Information Network Politics Cleaning USB Wireless Technology Workplace Tips Save Time Data Protection iPhone Legal Television Users Redundancy Encryption Mobile Computing Blockchain Transportation Commerce Streaming Media Apple Artificial Intelligence Robot Mobile Security Big Data Cortana WiFi Patch Management End of Support Remote Computing Cost Management Going Green Bandwidth SaaS eWaste Excel Fraud Samsung Data Storage Humor Disaster Content Filtering Battery OneNote HaaS Employer-Employee Relationship Compliance Sports Project Management Gmail Automobile Tech Support Data Loss Marketing Hacker Internet Exlporer Saving Time Google Docs Solid State Drive IT solutions Office Computer Care DDoS Phone System IT budget Scam Professional Services Exchange altivista Analysis Distributed Denial of Service Music File Sharing PDF IT Management Windows 10s Maintenance Employer Employee Relationship Travel SBS Nanotechnology compaq App store Analytics Storage Text Messaging Keyboard Credit Cards Instant Messaging WIndows Server 2008 Hard Disk Drive Device Security Identities Computer Accessories Wearable Technology Worker Commute Tablets Root Cause Analysis hp Mobile Device FAQ Managing Stress Devices IoT NFL domain Augmented Reality Scalability Business Intelligence Laptop Touchscreen Identity Uninterrupted Power Supply Books Lifestyle Hiring/Firing Charger Education Outlook Spyware Language Vendor Management Word remote Router Yahoo How To Managed IT Service Touchpad Data Privacy Legislation Benefits Wireless Charging Reputation iOS Running Cable Windows Ink Advertising Server 2008 Comparison Ali Rowghani Unified Threat Management Trending Evernote Regulation Computer Fan Edge Data storage Virus Training Entertainment Google Maps Specifications Screen Mirroring Upgrades Electronic Medical Records Ciminal Networking Point of Sale Sync Administration Dark Web Chromecast Meetings Proactive Company Culture HIPAA Software as a Service server installation dvd "cannot install required files" Safety Sales stock Black Market Cast Emails Consultant Smart Technology Workers Adobe Colocation Avoid Downtime Settings Websites Value Hard Drives Retail tweet Shadow IT Files MSP Lithium-ion battery Updates Document Management Licensing WannaCry Administrator calculator Data Theft Experience Conferencing Twitter HBO Webinar intranet Microsoft Word Mobile Relocation control Access Video Games Computing Microsoft Excel Gifts WSJ Virtual Reality IT solutions CrashOverride Hard Drive Thank You Emergency Congratulations Cache Monitors Remote Monitoring Worker

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...