{"id":141687,"date":"2019-02-12T08:16:43","date_gmt":"2019-02-12T13:16:43","guid":{"rendered":"https:\/\/www.countingpips.com\/?p=141687"},"modified":"2019-02-12T08:16:43","modified_gmt":"2019-02-12T13:16:43","slug":"are-you-phishproof","status":"publish","type":"post","link":"https:\/\/www.investmacro.com\/forex\/2019\/02\/are-you-phishproof\/","title":{"rendered":"Are You PhishProof?"},"content":{"rendered":"<div id=\"inves-2780602678\" class=\"inves-below-title-posts inves-entity-placement\"><div id =\"posts_date_custom\"><div align=\"left\">February 12, 2019<\/div><hr style=\"border: none; border-bottom: 3px solid black;\">\r\n<\/div><\/div><p>Phishing is one of the most common forms of cybercrime, so if you\u2019re online, you\u2019ve likely been targeted by a phishing attack\u2014and you might not even know it. So what is phishing exactly? It\u2019s the act of collecting personal information\u2014including bank account numbers, passwords, and usernames\u2014through electronic means, such as deceptive email messages and phone calls. According to <u><a href=\"https:\/\/www.rsa.com\/en-us\/offers\/rsa-fraud-report-q3-2018\">RSA\u2019s report for the third quarter of 2018<\/a><\/u>, phishing attacks made up 50 percent of cyber attacks this year, and that number is a huge increase from last year. That\u2019s why it\u2019s important to learn what the most common types of phishing attacks are, and how you can reduce your odds of falling for them.<\/p>\n<h2>Common Types of Phishing Attacks<\/h2>\n<h3>Snowshoeing<\/h3>\n<p>One type of phishing is called snowshoeing, where scammers send messages to several IP addresses and domains, with the intention of avoiding spam filters. This ensures that at least some of the emails make it to the inbox before the filters start to identify them as spam. This is much like how snowshoes distribute weight evenly over a large area, so you don\u2019t sink into the snow.<\/p>\n<h3>Spear Phishing<\/h3>\n<p>Another type of phishing is <u><a href=\"https:\/\/inspiredelearning.com\/blog\/spear-phishing-explained\/\">spear phishing<\/a><\/u>, in which the message is targeted toward one person, not just anyone. Spear phishers put their target\u2019s name in the message and try to make it look like it\u2019s coming from a friend or colleague using a spoofed email address. They might get this information from social media, such as LinkedIn. For instance, a spear phishing email might look like it\u2019s coming from the accounting department at work, requesting your bank account number or home address. It might also look like it\u2019s coming from your bank or favorite store, with a link asking you to input sensitive information, such as a password.<\/p>\n<h3>Whale Phishing<\/h3>\n<p>Whale fishing is a subset of spear phishing, as it targets \u201cbig fish,\u201d such as CEOs and board members. After all, these individuals tend to have more information, such as passwords and bank account numbers, than the average person. While it may take longer for scammers to convince these \u201cbig fish\u201d to give up personal information, the <u><a href=\"https:\/\/www.csoonline.com\/article\/2117843\/phishing\/what-is-phishing-how-this-cyber-attack-works-and-how-to-prevent-it.html\">payoff is usually better<\/a><\/u> than with regular spear phishing because they often get access to personal information from the entire company, not just one person.<\/p>\n<h3>Vishing<\/h3>\n<p>Vishing is short for \u201c<a href=\"https:\/\/inspiredelearning.com\/blog\/vishing-voice-phishing\/\">voice phishing<\/a>,\u201d so as you might guess, it involves the phone rather than email. If someone is vishing you, you\u2019ll get a phone call with a message from a voice that claims to be a bank. It might ask you for your account number, password, or other sensitive information. The message will usually ask you to press a number to talk to a representative, or it will provide you with a phone number to call so you can give them the information. Either way, you might be tricked into giving a scammer enough personal information to have money taken from your account within minutes, <u><a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/what-is-vishing-how-to-avoid\/\">making vishing a dangerous attack<\/a><\/u> if you fall for it.<\/p>\n<h2>How to Protect Against Phishing Attacks<\/h2>\n<p>Now that you know about the most common types of phishing attacks, <a href=\"https:\/\/inspiredelearning.com\/resource\/protect-against-phishing-attacks-infographic\/\">you can arm yourself<\/a> with the information you need to ensure you don\u2019t become a victim. Of course, you can expect to occasionally receive emails and phone calls trying to phish for information from you, but you won\u2019t fall for them once you know the telltale signs of phishing attacks.<\/p><div id=\"inves-3778241645\" class=\"inves-in-content inves-entity-placement\"><hr style=\"border: 1px solid #ddd;\">\r\n<div id=\"inpost_ads_header\">\r\n<p style=\"font-size:10px; float:left; color:#666;\">Free Reports:<\/p><\/div>\r\n<div id=\"inpost_ads\"> \r\n<p style=\"font-size:15px; float:left;\"><a href=\"https:\/\/goo.gl\/1ApBOV\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/investmacro.com\/wp-content\/uploads\/2018\/06\/graph_techs_PD.png\" align=\"left\" width=\"80\"  height=\"55\"\/><\/a>\r\n\t     <a href=\"https:\/\/goo.gl\/1ApBOV\"><b><u>Get Our Free Metatrader 4 Indicators<\/u><\/b><\/a> - Put Our Free MetaTrader 4 Custom Indicators on your charts when you join our Weekly Newsletter<\/p><br><br>\r\n<br>\r\n<br>\r\n<p style=\"font-size:15px; float:left;\"><a href=\"https:\/\/goo.gl\/f3RrHX\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/investmacro.com\/wp-content\/uploads\/2019\/01\/cot_pie_80.png\" align=\"left\" width=\"80\"  height=\"55\"\/><\/a>\r\n\t    <a href=\"https:\/\/goo.gl\/f3RrHX\"><b><u>Get our Weekly Commitment of Traders Reports<\/u><\/b><\/a> - See where the biggest traders (Hedge Funds and Commercial Hedgers) are positioned in the futures markets on a weekly basis.<\/p><br><br>\r\n<\/div>\r\n<hr style=\"border: 1px solid #ddd;\">\r\n<br><\/div>\n<p><strong>Look for spelling errors.<\/strong> Many phishing emails contain several misspellings and grammatical errors. This is because they\u2019re not usually crafted by copywriters and then proofread like a legitimate company\u2019s emails tend to be. In addition, it\u2019s common for phishers to live in other countries where English is not the main language, so <u><a href=\"https:\/\/www.technative.io\/phishing-in-2019-trends-and-research\/\">look for awkward phrasing<\/a><\/u> that makes it clear the writer is not a native English speaker.<\/p>\n<p><strong>Don\u2019t assume you know the sender.<\/strong> Keep in mind that just because a company or individual knows some information about you doesn\u2019t mean it\u2019s legitimate. There are plenty of easy ways for scammers to get your name, address, and phone number. They might even know where you work, and which bank you use. So, don\u2019t be fooled into thinking they\u2019re legitimate just because they know a few facts or claim to be from a company you\u2019re familiar with. And remember that trusted companies won\u2019t call or email you for personal information anyway<\/p>\n<p><strong>Be wary of links and attachments.<\/strong> If you get an email that claims to be from your bank, work, or credit card company, be suspicious of any links in it. First, hover your cursor over the link to check the URL. If it\u2019s real, the website should be spelled right. But even if it looks correct, there\u2019s a chance you\u2019ll be sent to a different website address <a href=\"https:\/\/inspiredelearning.com\/blog\/click-phishing-link\/\">once you click on it.<\/a> The same goes for phone numbers, as scammers can spoof numbers to make it seem like they\u2019re calling from a trusted company. And do not open attachments from email addresses you don\u2019t know, since they might contain viruses. So instead of clicking on a link in an email, type the website address into your browser yourself. And instead of answering personal questions when a possible scammer calls you, hang up and call the number you have for the company.<\/p>\n<p><strong>Report suspicious emails and phone calls.<\/strong> Once you realize the email or call you got it a phishing attempt, contact the company the phisher is trying to mimic. So, if it looks like it\u2019s coming from your bank, call your bank to report the phishing attack. Many companies keep track of these and will inform their customers about them to ensure they\u2019re not the next victim.<\/p>\n<p>Smartly trained people are your best defense against risk. Inspired eLearning offers <a href=\"https:\/\/inspiredelearning.com\/security-awareness\/security-first\/\">enterprise-level security awareness education<\/a> and an anti-phishing simulator, <a href=\"https:\/\/inspiredelearning.com\/security-awareness\/phishproof\/\">PhishProof<\/a>, \u00a0to organizations of all sizes. <a href=\"https:\/\/inspiredelearning.com\/#launch-modal-get-in-touch\">Contact us today<\/a> to find out how we can help your workforce stand strong in the face of ever-changing cyber threats.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing is one of the most common forms of cybercrime, so if you\u2019re online, you\u2019ve likely been targeted by a phishing attack\u2014and you might not even know it. So what is phishing exactly? It\u2019s the act of collecting personal information\u2014including bank account numbers, passwords, and usernames\u2014through electronic means, such as deceptive email messages and phone [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-141687","post","type-post","status-publish","format-standard","hentry","no-post-thumbnail"],"_links":{"self":[{"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/posts\/141687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/comments?post=141687"}],"version-history":[{"count":1,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/posts\/141687\/revisions"}],"predecessor-version":[{"id":141688,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/posts\/141687\/revisions\/141688"}],"wp:attachment":[{"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/media?parent=141687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/categories?post=141687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/tags?post=141687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}