skip to content
Primary navigation
Keyboard

News

5 Tips to Avoid Falling For a Phishing Scam

6/22/2016 4:05:34 PM

A fishing hook on top on a keyboard with a key labeled

A 2015 National Counter Intelligence and Security Center (NCSC) presentation reported that 47 percent of adult Americans have been the victim of a security breach in the past three years, and that 91 percent of those victims had fallen prey to “spear phishing”.

Many of the recent high profile security breaches, the Democratic National Committee (DNC) for example, started and/or provided the means to launch sophisticated phishing attacks. Here’s what you need to know about phishing, including how to protect yourself. 

What is Phishing (and Spear Phishing)?

Phishing (pronounced "fishing") has been around for almost as long as the internet, and is an unnervingly common way for cyber criminals to obtain sensitive data from private individuals and organizations. The basic strategy is to send out an email (often a mass email) that contains a malicious attachment or hyperlink. The attachment is malware, and the hyperlink directs people to a website that is camouflaged as something legitimate and familiar. The cyber criminals hope that the individual receiving the email will either download the attachment (exposing their computer to the malware), or provide sensitive information on the fake website after clicking on the link.

While phishing scams make us feel uneasy about the potential of someone obtaining our personal information, the more chilling version is known as “spear phishing”. As the name implies, these attacks are more direct and personal, as the criminal uses information they’ve collected on a particular individual or group of individuals to target their attack. Spear phishers use the personal information from social media sites and prior data breaches. The recent attack on the DNC was initiated by a coordinated “spear phishing” campaign.

Think you can spot the phishing email? Test your skills with the Today Show’s Phishing Quiz.


Phishing attacks can be scary; here are 5 ways you can protect yourself:

1. Watch for Links and Attachments

The primary purpose of a phishing attack is to get you to download an attachment, and/or click on a link. If an email includes an attachment and/or a link, use extreme caution—they may be malicious and include malware that could infect your computer.

If you notice a suspicious email that includes a link, hover your mouse over the text of the hyperlink to reveal the full URL. This should help you determine if it is a legitimate link or a link to something malicious.


2. Look for Red Flags

One of the easiest ways to identify a potential phishing email is to look for the “red flags” that are common among many of these attacks.

  • Typos: Spellcheck is one feature that many cyber-criminals are unfamiliar with. Most (if not all) phishing attacks include typos such as poor grammar and structure, as well as confusing text layout.
  • Unfamiliar Email Address: A simple way to check if an email is coming from a legitimate source is to look at the email address of the sender. For example, if the email references your recent purchase on Amazon and the sender’s address is AmazonSupport1234@Gmail.com, this email obviously did not come from Amazon.
  • Asking for Personal Information: A website, bank or organization should never ask you to confirm confidential personal or organizational information in an email. Always treat such requests with extreme suspicion, as the email is most likely phishing for your data.

3. Contact the Sender

Coordinated spear phishing campaigns can be difficult to detect. Often, these emails have less typos, they reference something you and/or your organization may be a part of, and they originate from what appears to be a reputable source. If you have any doubts about the message, it’s recommended that you send an email directly to the person or their customer service department, or contact the person or company directly by phone to verify that they sent the email.


4. Keep Your Software Updated

Software updates are notorious for taking a long time to install. While this may be disruptive for you in the immediacy, it is not nearly as disruptive as having your personal information stolen by  cyber criminals. Often, software updates contain critical patches that protect you against cyber criminals. Setting your computer and/or smartphone to auto-update while you sleep is an easy way to keep your devices current, and to protect yourself against cyber criminals.


5. Be Smart About Passwords

It’s hard to remember the passwords for all of your accounts, which is why many individuals use the same password for multiple account logins. But, there are tips and tricks for keeping your passwords distinct, strong and memorable. ConnectSafely recently published a post, Tips for Strong, Secure Passwords & Other Authentication Tools, which has many useful tips for passwords.

Following these 5 tips will help you reduce your risk for becoming a phishing or spear phishing victim. For additional information about staying safe online, please visit the MN.IT Services Security page

Cybersecurity

back to top