Thank you for Subscribing to Gov Business Review Weekly Brief
Going Phishing
Attackers are always looking for new ways to steal your information or access your systems. Although the method of “phishing” is not new, it has become more sophisticated and has spread across more platforms to cast a wider net. Emails are the most common, however, you can receive phishing attacks through phone calls, text messages, social media, or even QR codes. Emails Our inboxes are flooded with emails every day and even the best spam filters can’t catch all of the phishing attempts. The most common types look real and appear to come from legitimate sources like financial institutions, product vendors, internal departments, or even colleagues. Phishing emails used to be easier to spot with subtle misspellings or awkward grammar. Now they are much more advanced and can even seem personally targeted to your interests and online activity. Most of these emails have a common goal of getting the recipient to click on a link or attachment which will redirect them to a site to capture personal information, and credentials or install trojan software. Some emails may convey an urgent situation or appear to come from someone with an important title to further motivate the intended victim to open it and take action. Attackers may also do more research utilizing social media so they can target specific individuals with more authentic emails. This is commonly referred to as “Spear Phishing” where they reach out to people with elevated titles or within specific departments like finance. The process of “Whaling” involves targeting very high-profile executives who have sensitive knowledge and elevated authority.The more technology you use, the more vulnerable you could become. Be cautious when giving out information, clicking on links, opening attachments, or scanning QR codes.
I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info