Archives - Phishing Attack


Pay attention to URLs

You might already be aware that one of the tell-tale signs of a phishing ploy is a misspelled domain name or a destination where the true URL is masked by using a link shortener. Be wary of these links, but also look for “https” at the beginning of URLs through which you transmit sensitive data. […]

How to protect yourself from cyberattacks during the coronavirus pandemic

The spread of COVID-19, aka the novel coronavirus, has had a profound impact on businesses and organizations across the globe. In order to help contain the virus, employers are doing their part by encouraging, or even requiring, workers to stay home and work remotely. With much of the workforce doing their jobs from home, there’s […]

Phishing — It only takes one time

Data breaches do not typically happen when a cybercriminal has hacked into an organization’s infrastructure. Many data breaches can be traced back to a single security vulnerability, phishing attempt, or instance of accidental exposure. Be wary of unusual sources, do not click on unknown links, and delete suspicious messages immediately.

What is a phishing attack?

Phishing is a form of social engineering. Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization. For example, an attacker may send email seemingly from a reputable credit card company or financial institution that requests account information, often suggesting that there is a problem. When users respond […]

Double-check any new and unfamiliar website for phishing signs

Visiting a website for the first time, perhaps via an email link? Look for the tell-tale signs of phishing. These include misspellings and grammatical mistakes on the page, aggressive advertising and especially unusual and complex URLs. If you see some or all of them, leave the page immediately.

Bookmark your most important sites to keep reliable links on file

Phishers often steer would-be victims toward domains they falsely claim are legitimate sites, such as a bank’s web app or an identity verification landing page, insisting you act quickly. You can actually preempt this line of attack by keeping all your most important sites saved as bookmarks in your web browsers. These bookmarks can provide […]