SPONSORED

How You Can Prevent Phishing Attacks

Jul 2, 2018, 3:53 PM | Updated: Jan 22, 2020, 4:56 pm

Photo: Markus Spiske, Unsplash...

Photo: Markus Spiske, Unsplash

This article is sponsored by Les Olson Company, Your Office Technology Partner. Don’t let Phishing compromise your sensitive data and information. Get the expert technical support your business needs with Managed I.T. Services from Les Olson Company.


Chances are you’ve seen a phishing attempt in your email inbox in the last few days. It only takes a split second to be caught off guard by phishing emails, but the ramifications can last much longer. Here’s how can you prevent Phishing attacks on your computer and mobile devices.

I.T. Security

On this episode of I.T. Security, John Huston with the I.T. Services Department at Les Olson Company talks with host Ethan Millard about how to avoid phishing attacks. Phishing often happens through emails designed to trick you into providing personal information. If you think you’re too smart to fall for an email like this, you might be surprised. It’s not just the blatantly suspicious emails in broken English. These emails can look very legitimate, sometimes appearing to be from a bank, or some other organization you actually have dealings with. Don’t get tricked. Learn the signs that make an email “phishy”.

What is Phishing?

Phishing is an attempt to either gain and exploit your sensitive information or get you to click on a file or link containing malware or ransomware. Phishing usually happens through email, but can also be done through messaging apps, social media, and even the old fashioned way… the phone. These emails can be very sophisticated, using basic psychology to trick unsuspecting people into providing all kinds of information. While it can be quite easy to fall for these emails, there are some tell-tale signs that everyone should learn how to spot.

With 93% of Phishing emails also containing ransomware, this is a huge problem that you have to be diligent about.

What Can You Do About Phishing?

Photo: John Schnobrich, Unsplash

First, look who’s sending the email. Any email could potentially be a phishing attempt, and these emails can even appear to be from an individual or organization you personally know. It’s important to consider the context in these situations. Are you expecting to be contacted by this person? Do you have the type of relationship where they would send you files? It doesn’t hurt to be cautious and reply to their email asking them what the attachment is about.

You should also look out for creative misspellings; extra letters in email addresses or hyperlinks designed to dupe you. They are counting on your brain to simply overlook these slight differences in spelling. Additionally, if the subject line, name or greeting is generic, that is a great clue that this email wasn’t intended specifically for you. These bad actors like to cast a wide net, hoping someone will fall for their trickery. Be sure to avoid urgent email traps, in which the sender asks you to respond immediately. They are counting on you feeling the urge to act quickly and without thinking too much about it. Lastly, never provide ANY personal information through an email, over the phone, or on a website you’re directed to. A real financial institution, hospital, government agency, etc. will NEVER reach out to you asking for things like your account number or social security number. These are things they should already have if they are legitimately associated with you. Remember, when in doubt, simply pick up the phone and call the person or institution you’ve supposedly received the email from. It’s always better safe than sorry.

If You Fell for It

Les Olson Company offers proactive with training for organizations to educate their employees about specific threats such as suspicious emails, credential harvesting, password strength, and regulatory compliance with interactive training modules. Les Olson Company can even send simulated Phishing emails to your employees that emulate a range of phishing attack types to help you identify areas of weakness, and empower users through engaging training to strengthen your organization’s defenses. Contact Les Olson Company for a free vulnerability assessment.

 

KSL 5 TV Live

Sponsored

Women hold card for scanning key card to access Photocopier Security system concept...

Les Olson

Why Printer Security Should Be Top of Mind for Your Business

Connected printers have vulnerable endpoints that are an easy target for cyber thieves. Protect your business with these tips.

1 month ago

Modern chandelier hanging from a white slanted ceiling with windows in the backgruond...

Lighting Design

Light Up Your Home With These Top Lighting Trends for 2024

Check out the latest lighting design trends for 2024 and tips on how you can incorporate them into your home.

2 months ago

Technician woman fixing hardware of desktop computer. Close up....

PC Laptops

Tips for Hassle-Free Computer Repairs

Experiencing a glitch in your computer can be frustrating, but with these tips you can have your computer repaired without the stress.

3 months ago

Close up of finger on keyboard button with number 11 logo...

PC Laptops

7 Reasons Why You Should Upgrade Your Laptop to Windows 11

Explore the benefits of upgrading to Windows 11 for a smoother, more secure, and feature-packed computing experience.

4 months ago

Stylish room interior with beautiful Christmas tree and decorative fireplace...

Lighting Design

Create a Festive Home with Our Easy-to-Follow Holiday Prep Guide

Get ready for festive celebrations! Discover expert tips to prepare your home for the holidays, creating a warm and welcoming atmosphere for unforgettable moments.

6 months ago

Battery low message on mobile device screen. Internet and technology concept...

PC Laptops

9 Tips to Get More Power Out of Your Laptop Battery

Get more power out of your laptop battery and help it last longer by implementing some of these tips from our guide.

6 months ago

How You Can Prevent Phishing Attacks