Don’t be fooled by a simple email, you could lose everything.

Team Metalogic Dexter's Blog

What is phishing?

Cybercriminals are all around us, your critical data is always at risk…

One of the most common threats in the digital world is phishing. The attempt and procedure of trying to gather private information using fraudulent emails and websites, often targeted at the frontline workers of the business.

The cyberattack that uses innocent-looking emails as a weapon. The aim of a phishing email is to trick the email recipient into thinking it’s from a trusted source or of high importance, whether an email from the bank or from your boss. The target is to get as many unfortunate victims to click on the email and mistakenly download any attachments or click on the malicious links embedded within.

What are the different forms of Phishing?

As previously mentioned, threats have many forms. Phishing comes in all different shapes and sizes, with a mixture of strikes that all link together in the hope and goal to steal your personal data.

These include:

Deceptive Phishing – The most common type of attack, usually an email from a recognised sender, hoping to steal your information via the means of imitating a legitimate provider.

Spear Phishing – More prominent on social media platforms, an email from a recognised sender with personalised information to gain your trust and hopefully your private information.

CEO Fraud – Phishing aimed primarily at the big fish companies; specifically targeting executives. Used to authorise fraudulent financial transfers as well as key information all of the employees.

Pharming – The method in tricking the user onto a malicious website, by changing the IP address to a trusted name and gaining information via login forms that farm your details.

How do you avoid Phishing attacks?

Phishing attacks are simple to spot once you understand what they look like, whether they plan on stealing your identity, money or just personal details, there are a few ways to tell if it’s genuine or attempted theft:

  • Check the spelling of the message and the email links before you click or enter sensitive information.
  • Watch out for URL redirects, where you’re subtly sent to a different website with identical design.
  • If you receive an email from a source you know but it seems suspicious, contact that source with a new email, rather than just hitting reply.
  • Don’t post personal data publicly on social media. Such as your birthday, vacation plans, your home address or private phone numbers.

For more info get your FREE pinpoint guide on Phishing

We’re Team Metalogic

We’re Team Metalogic, a managed IT services provider offering outsourced IT services to SME’s across the UK. With a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

Our stress-free solutions don’t complicate things, in fact, they improve efficiency and save money.

Share this Post