Archives - Phishing Attack


Stay informed about phishing tactics

While phishing attacks remain a prevalent threat, staying informed on the latest attack evolutions can help to safeguard your devices. As general rules: Beyond these practices, consider taking some time to read more extensively on phishing attacks and put into practice safety measures accordingly.

Conduct regular phishing awareness training

Phishing is one of the most common cyber threats, with the number of phishing-related daily emails reaching millions. Speaking to business owners and managers, consider implementing routine phishing awareness training for employees, focusing on simulated phishing exercises to let employees know how to recognize and report phishing attempts. Given that employees are common targets for […]

Chrome’s phishing extensions help guard against scams

Phishing is a type of online scam designed to get you to reveal personal information such as credit card numbers and passwords. Chrome’s PhishDetector detects phishing attacks on online banking websites. Similarly, PhishTector identifies phishing emails in Gmail.

Phishing scams can come from anywhere

While email is perhaps the most common source of phishing attacks, they can come from practically anywhere. Text messages, social media, traditional mail and even phone calls may all follow the common phisher’s playbook by pretending to be a legitimate source asking for information. Remember: If you’re not sure, contact the alleged source directly with […]

Teach yourself to recognize phishing scams

Phishing scams often look like legitimate requests for information, but there are lots of ways you can spot a phishing attack. Suspicious sender addresses, unsolicited attachments and spelling and grammar mistakes are all signs that a request for information is not legitimate.

How to avoiding social engineering and phishing attacks

Do not give sensitive information to others unless you are sure that they are indeed who they claim to be and that they should have access to the information. Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be […]