Cybersecurity Awareness Month
Tips to Keep Your Data Safe From Phishing!
When it comes to cybersecurity, phishing attacks are one of the most common type of security breach. As a matter of fact, this was confirmed by a report published in 2020 by the FBI’s Internet Crime Complaint Centre.
What is phishing?
Phishing is the fraudulent technique to get sensitive data through the use of disguised emails. Additionally, pretending to be from a reputable entity, the email content is designed to trick individuals to reveal personal information, such as passwords and/or credit card numbers.
How do I identify phishing?
There are several forms of phishing. Specifically, this article will address the most common type of phishing ploy, email phishing.
- Email phishing: A phishing attempt sent by email will typically attempt to appear as a legitimate company by utilizing a fake domain name that appears to be from a creditable organization.
It is important to be vigilant when reviewing email to help minimize your risk of being tricked by a phishing email. Here are some key ways to help you protect yourself from an email phishing threat:
- Assess content. Observe whether the email has a link or an attachment and whether it is asking for money, credentials or sensitive information. Is the email content pressuring you with “time sensitive” phrasing.
- Do you know the sender? Check the email from the sender. Keep in mind that email addresses, company logos and links can be spoofed or disguised to look like the real deal. So always double check to make sure you know the sender especially if the email is asking for the above criteria.
- Verify who sent the email. By hovering over the vanity email name to check the email, calling the sender or checking the address in your browser are all strong defenses to help avoid getting snagged by a phishing technique.
- Report it. If you are getting a phishing attack at work, let your IT security department know about the attempt. If you are receiving a phishing email at home. It’s best to report the attempt to the entity that the phishing email is trying to emulate. For example, if it is a fake email from your bank, report it to your bank.
For a helpful way to visually process this information, visit Proofpoint, a leading cybersecurity company.
Cybersecurity is a priority.
Phishing is a harmful way to bait end-users in to sharing valuable personal data. As long as you are aware of this tactic and how it works, you will be able to defend yourself from this type of cybersecurity threat. We understand the importance of keeping your data secure as your lender. If you have questions about our security practices and the steps to help mitigate risks, feel free to connect with Joel for additional questions today!