Phishing is a type of email attack used by cybercriminals to steal valuable data. Learn how to identify three types of phishing that are becoming common.
Whether you run a small landscaping business or a large medical supply company, you know that protecting both your and your customers’ data is critical. Cybercriminals are constantly developing new ways to steal valuable data like credit card information, account logins, and anything else that they can sell. Phishing is one of the most commonly used methods. Cybercriminals send an email that appears legitimate but is actually designed to get employees to reveal important information. Increasingly, a targeted form of attack known as spear phishing is being employed. Here are three common spear phishing attacks to watch out for.
The most common spear phishing attack involves the sender impersonating a reputable brand, like Chase or Apple. The email will prompt the recipient to click through to a website that looks real but is designed to harvest the user’s login credentials.
The most common blackmail attacks involve “sextortion,” in which the email sender claims to have compromising footage recorded from the victim’s computer. The sender will threaten to release this footage to the victim’s entire contact list unless a sum of money is paid. The embarrassing nature of these attacks means they are often underreported.
Business Email Compromise
These attacks use emails that are designed to look like they are coming from a coworker, usually someone in an executive role like a CEO. They feign urgency and may even assert that the topic of the email was covered in a previous meeting. The goal is to trick the recipient into thinking that their boss is demanding sensitive information, usually bank account numbers, that the attacker can then use to wire funds to their account.
As cybercriminals develop increasingly sophisticated schemes to dupe businesses, you need a security team that can keep up. SYGNVS Integrated Solutions provides IT services for a full range of business needs, including cybersecurity. From guarding against attacks, like phishing and cryptolocker ransomware, to providing IT support and remote assistance, our experts can handle it all. For a Free Network Assessment contact Betty Bruce at (985) 892-7207 ext. 101 or email firstname.lastname@example.org for a consultation.