Phishing attacks use email or malicious websites to infect your machine with malware and viruses to collect personal and financial information.
Cybercriminals attempt to lure users to click on a link or open an attachment that infects their computers, creating vulnerabilities for criminals to use to attack.
Phishing emails may appear to come from a real
financial institution, e-commerce site, government agency, or any other service, business, or individual. The email may also request personal information such as account numbers, passwords, or Social Security numbers.
When users respond with the information or click on a link, attackers use it to access users’ accounts.
Spoofing attacks use email addresses, sender names, phone numbers, or website URLs that are disguised as a trusted source. Cybercriminals attempt to deceive users by changing one letter, symbol, or number within the name.
This tactic is used to convince users that they are interacting with a familiar source. Cybercriminals want you to believe these spoofed communications are real to lead you to download malicious software, send money, or disclose personal, financial &
other sensitive information.
HOW CRIMINALS LURE YOU IN
The following messages are examples of what attackers may email or text when phishing for sensitive information:
“We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below, and confirm your identity.”
“During our regular verification of accounts, we couldn’t verify your information. Please click here to update and
verify your information.”
SIMPLE TIPS

1) Play hard to get with strangers. Links in email and online posts are often the way cybercriminals compromise your computer. If you’re unsure who an email is from—even if the details appear accurate—do not respond, and do not click on any links or attachments ...
...found in that email. Be cautious of generic greetings such as “Hello Bank Customer,” as these are often signs of phishing attempts. If you are concerned about the legitimacy of an email, call the company directly.
2) Think before you act. Be wary of communications that implore you to act immediately. Many phishing emails attempt to create a sense of urgency, causing the recipient to fear their account or information is in jeopardy. If you receive a suspicious email that appears to be....
....from someone you know, reach out to that person directly on a separate secure platform. If the email comes from an organization but still looks “phishy,” reach out to them via customer service to verify the communication.
3) Protect your personal information. If people contacting you have key details from your life—your job title, multiple email addresses, full name, and more that you may have published online somewhere—they can attempt a direct spear-phishing attack on you....
Cyber criminals can also use social engineering with these details to try to manipulate you into skipping normal security protocols.
4) Be wary of hyperlinks. Avoid clicking on hyperlinks in emails and hover over links to verify authenticity. Also ensure that URLs begin with “https.” The “s” indicates encryption is enabled to protect users’ information.
5) Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in....
If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring.
6) SHAKE UP YOUR PASSWORD PROTOCOL. According to NIST guidance, you should consider using the longest password or passphrase permissible.
Use password managers to generate and remember
different, complex passwords for each of your accounts.
7) STAY UP TO DATE. Keep your software updated with the latest version available. Maintain your security settings to keep your information safe by turning on automatic updates so you don’t have to think about it, and set your security software to run regular scans
Image
#BeCyberSmart on the Internet—at home, at school, at work, on mobile devices, and on the go.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Secunets Technologies Limited (STL)

Secunets Technologies Limited (STL) Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(