Cybersecurity Awareness Month

Phishing scam, hacker attack and web security vector concept. Illustration of phishing and fraud, online scam and steal

Cybersecurity Awareness Month

Tips to Keep Your Data Safe From Phishing!

Regarding cybersecurity, phishing attacks are among the most common security breaches. The FBI Internet Crime Complaint Centre published a report in 2020 confirming this fact.

What is phishing?

Phishing is a fraudulent technique to get sensitive data through disguised emails. Additionally, the person phishing acts like a reputable entity. For example, they create email content to trick individuals into revealing personal information, such as passwords and/or credit card numbers.

How do I identify phishing?

There are several forms of phishing. Specifically, this article will address the most common type of phishing ploy, email phishing.

  • Email phishing: A phishing attempt sent by email will typically attempt to appear as a legitimate company by utilizing a fake domain name that appears to be from a creditable organization.

Be vigilant when reviewing emails to help minimize your risk of being tricked by a phishing email. Here are some key ways to help you protect yourself from an email phishing threat:

  1. Assess content. In other words, observe whether the email has a link or an attachment and whether it is asking for money, credentials, or sensitive information. Is the email content pressuring you with “time-sensitive” phrasing?
  2. Do you know the sender? Check the email from the sender. For instance, remember that email addresses, company logos, and links can be spoofed or disguised to look like the real deal. So always double-check to ensure you know the sender, especially if the email asks for the above criteria.
  3. Verify who sent the email. Hovering over the vanity email name to check the email, calling the sender, or checking the address in your browser are all strong defenses to help avoid getting snagged by a phishing technique.
  4. Report it. If you are getting a phishing attack at work, inform your IT security department about the attempt if you receive a phishing email at home. It’s best to report the attempt to the entity the phishing email is trying to emulate. For example, if it is a fake email from your bank, report it to your bank.

For a helpful way to visually process this information, visit Proofpoint, a leading cybersecurity company.

Cybersecurity is a priority.

Phishing is a harmful way to bait end users into sharing valuable personal data. As long as you know this tactic and how it works, you can defend yourself from this type of cybersecurity threat. We understand the importance of keeping your data secure as your lender. If you have questions about our security practices and the steps to help mitigate risks, feel free to connect with Joel for additional questions today!

© Joel Richardson. All Rights Reserved. | This website is operated by Joel Richardson, who is currently an employee of VeraBank, N.A. (“VeraBank”) The views expressed on this website are not necessarily those of VeraBank. This website also has its own privacy policy, which may differ from VeraBank’s privacy policy. VeraBank makes no express or implied warranty regarding the information or data on this website, and hereby expressly disclaims all legal liability and responsibility to persons or entities who use or access this site and its content, based on their reliance on any information or data that is available through this website. Joel Richardson has sole responsibility for the information and data on this website. Deposit and loan products described on this website are offered through VeraBank, Member FDIC. To visit VeraBank’s website, here.