- Deceptive Phishing – This type of phishing is the most common. It’s usually sent to the masses in the shape of your bank telling you that there has been suspicious activity on your debit card and to click a link to verify your account, or a social media site telling you to update your password or else they will take a negative action towards your account.
- Spear Phishing – When an attack is targeted to a single person. Hackers research the target on Facebook, Twitter, LinkedIn, and paid information sites to make the attack as authentic as possible. Spear phishing is usually the first step to performing a full-blown attack on your computer.
- Whaling – Cleverly named, whaling refers to hackers going after the “big fish” – or the executives of a company. This requires a hacker to do a deep dive in researching their victim and getting all of their facts straight to be as convincing as possible. They often ask for wire transfers to different countries, tax information on employees, and disclosing the company’s financial information. High level executives often have the most access to company information; including credentials to critical business applications, client contact information, and finances.
- Pharming – This is similar to classic phishing, sending a link to a fake site, however, victims don’t even need to click a link to be brought to a malicious site. Attackers can get into the victim’s computer and redirect the user to a fake site, even if the correct address is entered.
- Check the sources of suspicious emails. Most phishing emails use credible business domains, but have an extra letter, a dash, or have a different domain suffix. An example may be co or youcrompany.com If you’re unsure if the domain is legitimate or not, look up the website before taking any action. Another step to consider is registering these alternative domain names so they are not available for purchase by others.
- Check the content of the email for spelling mistakes, weird characters, and misuse of your name. For example, they may say “Dear valued customer, Dear member, or use your full email address in place of your name. These are getting much more difficult to identify. If you are not sure, call the bank or institution that the email is supposedly coming from, direct to confirm anything. The IRS will never send you an email for collection as an example.
- Educate your team. Some ongoing training services are available through Baroan to prevent phishing scams or make the users aware of the latest threats. These include online cyber security tips and tricks as well as test phishing campaigns.
Information Technology Aligned With Your Business Goals?
Baroan is a complete IT services & IT support company working with organizations in Elmwood Park and across the United States of America.
When it comes to IT services and solutions, you need someone who not only comprehends the IT industry but is also passionate about helping clients achieve long-term growth using proven IT solutions. Guy, in leading our company, is committed to helping clients improve their technology in order to develop a competitive edge in their industries.
At Baroan Technologies, Guy Baroan leads a team of dedicated professionals who are committed to delivering exceptional IT services and solutions. With his extensive expertise and hands-on experience, Guy ensures that clients receive the utmost support and guidance in their IT endeavors. Trust in Baroan Technologies to elevate your business systems and stay ahead in today’s competitive landscape.