Are You Getting Phished?

Are You Getting Phished?

No alt text provided for this image

Since I am an avid fisherman, I thought I would use the illustration to the right to compare the correlation to actual fishing. Is it Fishing or Phishing? In essence it is still the same thing. Bait is thrown out there waiting for a bite. So a bad guy waits for a fish/victim to swallow the hook and make the run. Wait, you're not going anywhere. Why? Because you have a hook in your mouth and can't get away. Whether they have have installed malware or got you to inadvertently give away information that is all they need. Enough about that, I think you get the point. Phishing, as we call it, is the fraudulent practice of sending emails to a reputable company to induce individuals to reveal personal information, such as passwords, social security numbers, credit card numbers, and other PII, Personally Identifiable Information. It is incredible how many of us have fallen victim to this type of attack, while at work or on your personal time. Either or, it is a severe problem, even more now that we have so much unrest in the online world. So many hackers and scammers are coming out of the woodwork in droves to wreak havoc. According to Dmitri Alperovich, head of the Silverado Policy Institute, who made his name as the founder of CrowdStrike, indicated it's quite possible "they" will release the criminals "they" have arrested this year, which would send a signal to the criminal underground that it's open season on Western organizations." We know who the "they" are. For the purposes of the article, let's be neutral.?

How many of us clicked on unsuspecting emails? Don't say you haven't. I have. I don't do it anymore since I am a little more cautious and yes a little paranoid. This past weekend someone reached out to me from ________ Realtors asking me if I was interested in a real estate sales position. I am protecting their name because I don't want to be accused of slander; there is enough of that going around these days. I would never consider selling real estate, nonetheless. I investigated the email address and the person behind it. Guess what? The person that emailed me did not exist, red flag #1. Here was the exciting part, there was a link in the body of the email saying that if you are not interested in receiving this type of email and "don't?want to make a lot of money," click here. I love the FOMO "fear of missing out". The bad guys are using this technique, so be careful. Getting back to the email, the unsubscribe link in the email is usually at the bottom because they want you to finish reading the email then decide what to do. Because the person did not exist led me to believe that the connection was an extension to a Malware virus; now once malware is installed on your computer, the bad guys can follow everything from keystrokes to passwords and anything in between. Oh yes watch out for the unsubscribe button, there can be malicious links in there as well. Just delete it!

While going through your cybersecurity journey, it is essential to dig a little deeper. The?Federal Trade Commission?is the U.S. Consumer Protection Agency?charged with helping Americans protect their data and privacy. Its goal is to help adults and teens think through the consequences of oversharing. There are many tips on their website if you are unsure.

I picked up some great advice from Kristin Judge, CEO and President of Cybercrime Networks, while researching for this article: Here are some great tips.?www.Internetlivestats.com?is a website that shows in real-time how much we are sharing our lives digitally and using the internet to communicate. It's become second nature for some people to post the good, bad, and ugly about their life online, with Photoshop, of course. Now with more Deepfakes out there what do we believe? It is unbelievable how much the younger generation is posting in SNAPCHAT and now TikTok. It's important to realize that a business can be impacted by the actions of staff, family, and friends, even when they're away from work. With five billion videos watched on YouTube on any given day, think about what could happen if a video of someone at your office doing something controversial went viral.

No alt text provided for this image

The website ReputationDefender has four common-sense tips about limiting sharing online. The first is to lock down your account. Think before adding birthdays, addresses, phone numbers, and other personal information to your profile. Why? Because you can be profiled and targeted in a Spear Phishing attack. Set your privacy settings to keep the public from seeing your posts. A friend of a friend's privacy setting may not be a good idea. Do you trust all your friend's, friends? Next, consider who might read your posts. Does the information you post online pass the grandma test? The rule in our family was never post something you wouldn't want your grandma to see.?Your posts may be read by future customers, members of the press, your competitors, future employers or investors, or even worse, your grandmother.?If you don't want her to see it, don't post it. The third tip is, don't post other people's information. Anyone born after Facebook was created most likely has a photo history of their life online that they did not make or give permission for. I understand proud parents wanting to show off their beautiful baby, preschooler, kindergartner, middle schooler, but the experts at ReputationDefender encourage you to think twice before sharing information about others. Set your privacy settings to require you to approve someone else tagging you in a post.

No alt text provided for this image

And please, please stop posting about upcoming or ongoing trips. Just this past spring break, I saw posts with friends sitting at the airport, announcing they were on the way to a beach vacation for a week. I called my friend who I knew was on vacation and said, how is your trip going? Great, he replied. I said, then why is there a moving truck in front of your house? Next, I can't feel my legs, he replied. I said, no worries, I am only kidding. The point is, when the bad guys want to get you at your most vulnerable, they will usually exploit that.

Do you trust the 800 people within your social media accounts that know your house is empty? How about an email notifying you that your Netflix account was suspended while you were away? A simple email explaining that you must put in a credit card to get that account back online might prompt you to do something now instead of doing it when you get home. If a would-be cybercriminal can look at a business website and find contact information for the CEO, accounts payable manager, HR specialist, or CFO, then they can start the?phishing?process. They can send a pretty convincing email to test the waters. This is know as social engineering. So take a look at your company website and see how much information can be gathered to help trick someone online. The point is, creating a sense of urgency is one way the bad guys get what they want. If you are a bad guy and experienced with any form of socially engineered tactics, then it can be figured out.

Email is not the only place to watch for phishing attempts.

No alt text provided for this image

The bad guys know how much time we now spend on our phones, so they're now phishing us by text or through sophisticated apps. If you get a text you're not expecting, delete it, especially if that random text has a link or asks you for information. Now, with many people out of work, employment apps are working to separate you from your information. If someone needs you, let them call you. Fake websites can also phish sensitive information from an unsuspecting user, such as Covid-19 information or charitable organizations. The website?www.opendns.com?has a free online test to see if you can spot a fake website. Also look for the HTTP vs the HTTPS. The HTTPS indicates that it is a secure website. A lock icon can usually be found next to it. Take some time to go through this test with your coworkers and learn together. The best way to avoid becoming a victim of phishing is just to slow down a bit and be cautious.?The Stop Think Connect International Campaign?has a very simple message. Stop before you click on something, think about what you are sharing and with whom, and then connect to the internet with confidence—good advice for all.

No alt text provided for this image

Go Fishing and have fun!!!! But don't tell everyone where you're going and how long you will be out of town. LOL. That's me on the right, fishing for Striped Bass a few years ago.

I hope this information was helpful, be safe and be well.

Having the best system in place is all well and great but it means nothing if it does not protect. Businesses and organizations collectively lose billions of dollars a year to IP thief, financial thief, malicious attacks and social engineered attacks etc. Let’s not forget about professional reputation.

Current member of these professional affiliations

InfraGard, Federal Bureau of Investigation (FBI)

International Association of Financial Crime Investigators (IAFCI)

Association of Fraud Examiners (ACFE)

要查看或添加评论,请登录

Steven C.的更多文章

  • Beware of Job Scams

    Beware of Job Scams

    Here is yet additional information that I wanted to share, and we all should be aware of, The old "Job Post." As we…

  • Impersonation Fraud

    Impersonation Fraud

    Is impersonation a form of Social Engineering? It sure is. As one of the four vectors used in Social Engineering…

    1 条评论
  • Is Your Digital Footprint Bigger Than It Needs To Be?

    Is Your Digital Footprint Bigger Than It Needs To Be?

    Thinking about our digital footprint immediately brings us to social media - and with good reason. Countless social…

  • Social Engineering Is The New Frontier, or is it?

    Social Engineering Is The New Frontier, or is it?

    By: Steven Crociata So, what do we think about when we hear the phrase social engineering? Would you think of…

  • Understanding Fraud, The Basics

    Understanding Fraud, The Basics

    For those of you who are experienced in the field of fraud investigations my apologies for reiterating the…

    3 条评论
  • Money-Laundering Techniques and Invoice Fraud

    Money-Laundering Techniques and Invoice Fraud

    Money-Laundering Techniques and Invoice Fraud I wanted to re-post this article since I got some valuable feedback to…

    7 条评论
  • Ethics, It Makes Good Business Sense

    Ethics, It Makes Good Business Sense

    Many times we ask ourselves why people do the things they do. Is it for money? Power? Or even sheer selfishness? One…

    1 条评论
  • Most common Scams investigated by the FBI

    Most common Scams investigated by the FBI

    This comes from my friends at the FBI. The following are some of the most common scams that the FBI encounters, as well…

    4 条评论
  • New scam going around town, or is it?

    New scam going around town, or is it?

    So as one would have it, there is yet another credit scam going around town and it is a really good one. My wife came…

    10 条评论
  • If you get attacked by Ransomware what do you do?

    If you get attacked by Ransomware what do you do?

    I am updating this article since I originally posted it in 2017. Now we are in 2022.

    1 条评论

社区洞察

其他会员也浏览了