Don’t Take the Bait

Don’t Take the Bait



What is phishing?
Phishing is a form of attack that depends on tricking or fooling a victim into doing what the attacker wants.
 The attack begins with the attacker sending a message to the victim. It is this technique of using a message as bait to lure the victim that gives the attack its name.
 The attack is a success if the victim reacts to the message. For instance, the victim may click a link or open an attachment that triggers some kind of threat.
 In the case of communication between attacker and victim, the attacker will attempt to manipulate the victim using social norms and expectations to convince them to do what they want.

 Did you know that 93% of successful cyberattacks begin with a phishing scam?

 Types of phishing

The most common types of phishing are:

  • Phishing refers to email messages.
  • Smishing refers to text messages (SMS).
  • Vishing is bait left on someone’s voicemail.

  Spear phishing, which can happen via email, text or voicemail, is where the attacker researches their specific victim and crafts a personalized message just for them.

The large wealth of information available on the Internet makes it possible for attackers to craft spear phishing messages for just about any victim. For example, an attacker will impersonate the victim’s boss to encourage the victim to respond.

 Tech support scam, which typically starts with a phone call or a live chat message, is a scam where an attacker offers to help solve a problem with your account or computer by doing a remote support session with you. This gives the attacker access to your computer so that they can then access your bank or encrypt the computer with ransomware.


Why is phishing a problem for individuals and organizations?
  • Prevalence: More than 90% of compromised accounts or hacks start with a phishing attack.
  • Speed: More than 60% of victims of a phishing attack “bite” in the first hour, so it is difficult for organizations to react in time to stop the attack.
  • Cost: Business email compromise cost organizations $4.1 billion USD in 2020 (up from $1.77 billion in 2019) along with recovery operations and reputational damage.
  • Impact: Individuals suffer from phishing, both through workplace shame and cleanup effort, and personal repercussions like identity theft and credit rating damage.

 

 What should I do?

If you think you have received a phishing message :

  1. Do not respond.
  2. Forward the message to CyberSecurity@edecs.com
  3. Delete it.

If you clicked on a link or opened an attachment :

  1.  Contact the IT Team
  2.  Change your passwords.
    • Related Articles

    • Think before you click!

      Stop, think... should I click? The concept of "think before you click" is actually one of the most important factors in terms of information security. When you receive an email, download a file(s) from the internet, or click on a link, think of the ...
    • F - Following basic rules of social networking

      Please be patient and wait for the picture to appear. 10 Basic Netiquette Rules : 1- Make Real People a Priority 2- Use Respectful Language 3- Share With Discretion 4- Don't Exclude Others 5- Choose Friends Wisely 6- Respect People's Privacy 7- Fact ...
    • Do not share your password

      Below are some reasons which establish why sharing passwords is bad. 1. You compromise your account security When you share your password with another person, you essentially grant them access to not only that account, but every account you own that ...
    • 10 Ways to detect a phishing email

      1- Don't trust the display name of who the email is from. Do not solely rely on the name of a person you know or trust as an assurance of the email’s authenticity. Always verify the email address to confirm the true sender. Email sender addresses can ...
    • C - Clear Cookies

      Please be patient and wait for the picture to appear. The Information Solutions Security Advisor provide information and cyber security Awareness and compliance across the range of IT services provided to business. Why Clear Cache and Cookies? ...