Avoiding Phishing

Avoiding Phishing

Part of having an email address is the understanding that you will receive unsolicited messages. We tend to categorise these as either legitimate or spam. Spam however is not always as innocent as trying to sell you something.

One of the more sinister types of unwanted emails are what we call Phishing emails. These are essentially designed to coax out of you private information about yourself, your company or a third party. 

A great example of a Phishing email that most people have experienced is the “unknown inheritance” version. This is generally a long lost Nigerian prince or oil tycoon who has passed away and left everything to you if you can only provide them with some personal details to aid the transfer. 

Most of us by now have built up a bit of an immune system to these more basic messages, however the con-artist are getting smarter. Where once the scammers tried to get all info out of you in one go, now they are being more patient and even combining methods.

The first email may be designed to find out your position at your company. A simple response will suffice as most of us have name; position and phone number. A follow up call may request your date of birth before proceeding with the call. After receiving these pieces of data, it is far easier to Phish an employee at work with the scammer pretending to be you over email.

How do we prevent this? Well start by avoiding clicking links in emails. Secondly don’t stress about people having your position and phone number, a good google will likely reveal this. Finally, just be aware of email requests that appear strange. 

If you are ever unsure of a request from an email simply follow up with a good old fashion phone call. Particularly if it is your boss wanting to do a quick transfer of funds to an unknown bank account. A call to confirm it is legitimate takes no time at all.

Dr Geoff Augutis

Strategic IT Consultant Specialising in Government & Education | Company Director | Queensland Computers

5 年

For a quick video on what to do after you have been Phished see:?https://www.dhirubhai.net/feed/update/urn:li:activity:6544343506675130368

回复

要查看或添加评论,请登录

Dr Geoff Augutis的更多文章

  • Apple WWDC 2019 Announcements

    Apple WWDC 2019 Announcements

    Each year Apple run a flagship industry event known as the Worldwide Developers Conference (WWDC) which this year…

    3 条评论
  • When to Emoji

    When to Emoji

    There are subtle differences between talking to someone on the phone vs in person. You miss facial expressions and body…

    19 条评论
  • Too much screen time?

    Too much screen time?

    Whether you are speaking to the parents of a 5 year old, 15 year old or 25 year old, one thing remains constant. These…

  • Online Voting??

    Online Voting??

    With the election fast approaching the topic of casting your vote is front of mind for many locals. With pre-polling…

    10 条评论
  • Smart Tech Privacy Concerns

    Smart Tech Privacy Concerns

    If young adults these days are the product of the smart phone era then the children of today will be the smart…

    6 条评论
  • Apple vs PC

    Apple vs PC

    One thing we love as humans is to have choice. The nature of this means that we end up being very passionate about…

    8 条评论
  • Windows 7 End of Life

    Windows 7 End of Life

    When a software company like Microsoft releases a new version of their flagship product (Windows), they don’t always…

    2 条评论
  • Devices at Cyber risk

    Devices at Cyber risk

    Some things in life you simply didn’t know what you needed to know until it happened. Riding a bike is something we…

  • Apple Show Time Event

    Apple Show Time Event

    Over the last week we have seen releases from Apple in terms up updated hardware in their product line up. This…

    6 条评论
  • iPad Air and iPad Mini again?

    iPad Air and iPad Mini again?

    For Aussies waking up on the 19th March 2019 you may have been hit with a little bit of Déjà vu. Overnight there was…

    3 条评论

社区洞察

其他会员也浏览了