Stop the Breaches!
Sherry Staiger
Channel Sales Leader | Driving Revenue Growth in Cybersecurity & SaaS & Cloud | Expert in Partner Management, GTM Strategies, & Recurring Revenue | Proven in Strategic Sales & Channel Ecosystem Expansion
SECURITY HINTS & TIPS:
Extortion with a Twist
You may or may not visit sensitive websites in your free time. However, what would happen if a hacker tried to blackmail you by saying that they had “proof” that you were on a sensitive website? This is a common example of how extortion-type phishing attacks work.
How it works:
The bad guy doesn’t actually have the compromising content that they claim they have. Do not send them money! Either delete the email or follow the reporting procedures that your organization has put in place.
Tips to avoid extortion:
Although the above is a scam and not true extortion, legitimate extortion is a serious internet crime that can lead to devastating consequences for victims.
According to the FBI, here are some things you can do to avoid becoming a victim of extortion:
Remember, these attacks are only successful if we fall for them. Stay alert and be cautious!