Archives - Phishing


Use a link scanner to check URLs before opening them

If you receive a link via email, DM or on social media, you can’t always be sure of the source or its actual destination. Bad actors will hide a malicious URL using various tricks, such as changing the displayed text to something seemingly safe or use a URL shortener so it’s indecipherable. Fortunately, you can […]

Always report suspicious account activity

For most online accounts, you’ll receive a login notification or verification email whenever you input your credentials. These are a great way for service providers to confirm it’s really you trying to access your account, but if it’s something you do frequently you might get a little complacent about receiving those emails or messages. Don’t […]

Stay alert for smishing

Despite SMS being a somewhat outdated medium, “smishing” (SMS phishing) presents a real risk to your personal information and online security. It’s a perfect method for scammers because the limitations of simple text characters and links makes it easy to hide their true intentions. As texts are often received and read on smartphones, scammers can […]

Look for the ‘verified’ tick on YouTuber comments

Sometimes, a well-known YouTube series – especially those by an influencer – will feature fake accounts  in the comments section. These people or bots may pretend to be the YouTuber, mimicking their language to encourage you to click a phishing link. Fake prizes are a common hook; they often target some of the biggest accounts […]

Be careful with links and when entering website addresses

Use caution when clicking directly on links in emails, even if the sender appears to be someone you know. Attempt to independently verify website addresses (e.g., contact your organization’s helpdesk, search the internet for the sender organization’s website or the topic mentioned in the email). Pay attention to the website addresses you click on, as […]

How to avoiding social engineering and phishing attacks

Do not give sensitive information to others unless you are sure that they are indeed who they claim to be and that they should have access to the information. Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be […]