Blog Post

Identifying and Dealing with Phishing

Shaan Randhawa • Oct 16, 2023

Don't let cybercrime win!

Phishing scams have the capability of taking down your online structures with the click of a button. From emails to texts, phishing scams can attack a business from any angle.

Being well-versed in these digital threats can help your business put up the defences needed to recognise and block this form of cyber-crime. Read on to educate yourself further on the dangers and types of phishing!

1. Pharming

Pharming needs little cooperation from its victims. Instead of clicking on a link to a fraudulent website, the hacker installs a malicious code onto your server. This code then directs you to a dangerous website that’ll ask you to upload sensitive information (for example, they may pose as a trusted bank asking for your account details). Pharming has more potential harm than regular phishing, because there’s no active trigger for the attack from the side of the victim . This means there’s more of a chance for falling for the scam, because it’s harder to look for the tell-tale phishing signs (misspelled names, public domain email).

Avoiding pharming is quite simple . Using a specialised DNS system can add an extra layer of protection against scams such as phishing. It’s also a good idea to keep a keen eye out for any mistakes on the hacker’s part: misspellings in the URL/website, or the lack of a terms and conditions page is a giveaway to a thrown-together, scammy website. It’s also a good idea to enable two-factor authentication , as even if the hacker gets hold of your passwords, they won’t be able to use them without the code sent directly to you to access your accounts.

2. Whaling

Whaling is when a hacker poses as a trusted, senior member of a company in order to extract information from a lower-level worker . This phishing scam is effective because employees are more reluctant to refuse information to those with authority over them in their workplace. They’re often able to gain legitimacy by choosing specific targets and researching them through social media before making contact. For example, if a person posts about visiting a local restaurant with colleagues over the weekend, the hacker might reference it in the phishing email. This builds legitimacy, and means there’s less suspicion on the victim's side when asked for personal details.

Aside from setting up s pam filters for employee emails, it’s important to ensure your workers are up to date on the latest prevention protocols. This means ensuring your workers know that you or any other senior members will ask for confidential details over phone, email, or in the same digital space. Just like with pharming, setting up two-factor authentication is also a good prevention in case personal passwords are leaked.

3. Spear Phishing

Regular phishing values quantity over quality: oftentimes, a generic email is sent out to thousands of addresses, with the hopes that a small percentage click on a malicious link. Spear phishing, however, is more specific than this.

With spear phishing, the hacker chooses a specific target and conducts research on them , (this may be done through looking through any social media or online profiles of the victim). They then use this information to craft an email that references knowledge they’ve gathered about the person (for example, they might reference a new season of a show the victim might’ve posted about). The email is then sent, with the hacker posing as a trusted source (maybe a family member or colleague). This then lures the individual into a false sense of security , and makes them more susceptible to clicking on any malicious links, or to giving over any confidential information.

Avoiding this type of phishing scam is mainly about ensuring you’re educated on how to respond to emails you’re unsure of. For example, if you receive an email from someone you know with a link/asking for private information, either call them or speak to them in person to confirm they’re the ones who sent the request. It’s also a good idea to check for the typical phishing signs on the email (the domain may have small differences from the real one, low-resolution images on the logo, and misspellings and mistakes are all signs).

4. Snowshoeing

This phishing scam is when the hacker uses multiple IP addresses through different domains to overwhelm a person’s spam filter. In simple terms, snowshoeing allows a hacker to cover a large amount of ground, so a small number of emails can make their way into a user’s direct inbox.

This is a difficult scam to avoid because the spam means that your email filters are less likely to catch malicious emails, meaning it’s more likely you’ll end up with malicious links in your direct inbox.

Adding too many spam filters may cause you to miss legitimate or important emails, meaning that more protection can often cause a different set of problems.

This is why educating your staff on the signs of snowshoeing phishing scams is important. Although different in execution, the appearance of these emails appears the same, meaning you’ll still be checking for the general signs (such as misspelled words, low quality images, etc.).

Phishing is a scam that affects many businesses and individuals. However, with the right information and training in place, we can prevent this cyber-crime. Vibrant provide phishing simulation attacks, security awareness training (SAT) and advanced spam filtering services. If you feel the need to update your digital security, feel free to reach out to the team at Vibrant, the experienced cyber security experts in Walsall. Call us now at 01922 612387, or email at info@vibrant-networks.co.uk.

By Shaan Randhawa 08 Mar, 2024
Take a look at some of these phenomenal women and their achievements!
By Shaan Randhawa 06 Oct, 2023
Malware can't attack your market share directly the way a competitor can. However, it can break down your digital walls, steal your money, and hold your precious data for ransom. Here's why you should care about malware, and how you can protect yourself from it!
By Shaan Randhawa 20 Sep, 2023
Moving offices can be the start of a new chapter, meaning it's important to begin as you mean to go on. Read on to find out how to install your IT in a way that won't cause you problems down the line!
By Shaan Randhawa 13 Sep, 2023
When moving into a new home, it's important to ensure all of your tech is up to date. Read on to find out the best tech to install in your new home!
By Shaan Randhawa 07 Sep, 2023
Microsoft recently announced that it will end support for Windows Server 2012 and Windows Server 2012 R2 on October 10, 2023 . What does this mean, and how can it harm your business? Well, if your business is still using these models, you will no longer receive bug fixes, updates, or support . This leaves your business data vulnerable to harmful attacks like malware, ransomware, and phishing. To protect your business, it's crucial to start thinking about switching to a different software as soon as possible, (such as the more recent such as Windows Server 2022). With this coming into effect next month, it’s a good idea to start thinking about changing over to a different software. Many businesses may have been using Windows Server 2012 for over a decade, which is why we understand how it may seem complicated overhauling your system. To help you with this task, we've put together a guide to help you figure out where to start! What measures should you take? The first step is to decide how much you’re willing to invest for a server upgrade. Creating a budget to stick to is an important step when upgrading software, as you need to know the price range you’re looking at. Conduct a digital inventory audit : take stock of your current apps and servers to identify what's important for your business. This will help you determine the features you need, such as memory, storage, processing power, and scalability. Before transferring your data to the new software, make sure to back it up . This ensures that you won't lose any important files in case of an error. You should also test methods to move data (with the guidance of an IT expert), in a way that has low downtime and moves your information over with few issues. Next, you should test the new software . This includes the servers, apps, and security systems on the new software. Once the testing is complete, roll out the software to a select group of employees to evaluate its performance and address any final bugs . After that, you can confidently implement the new system across your entire business. At our expert IT company, we understand the importance of up-to-date and smoothly running software in preventing hacks and malware. If you require assistance with updating your Windows software, contact us today at 01922 612387 or email us at info@vibrant-networks.co.uk. Our team is ready to help you safeguard your business and ensure its success in the digital world.
By Shaan Randhawa 10 Jul, 2023
Unsure about Meta's new app? Wanting to know whether it's an opportunity for your business? Well, Vibrant Networks have done the research for you: read on to find out how Threads can fit into your new marketing plan!
By Shaan Randhawa 21 Jun, 2023
Why refurbed laptops are better for both your business, and the planet
By Amber Jessal 01 Aug, 2021
Vibrant Networks are proud to announce of their projects managed to win Network Computing Awards 2020 Network Project of the Year
By Amrik Jessal 19 Mar, 2020
The Coronavirus is spreading as fast as feared. Business must be ready for the worst. The writer can show their personality: In blog posts, the writer has more leeway to add in their voice and personality than other types of writing. Blogs are a great form of mass communication: You can help people, learn new things, entertain your audience-the possibilities are endless and amazing. Blogging opens up all of these to a very wide audience. You can make money: Get the right blog going and you can make a lot of money through advertising and sponsored posts. It allows people to craft better thoughts: Instead of reading haphazard, uneducated Facebook statuses, it's much better to see people's thought process in a well-written blog post. You can establish a community: Blogging allows you to connect with other individuals who share the same interests. Sharing ideas and opinions within your community helps establish yourself as a thought le...
By Amrik Jessal 07 Feb, 2019
The workshop was held to spread awareness about the importance of cyber security within businesses, and the potential risks of ignoring the vital protection against computer Ransomware, Viruses, Malware and Hacking.
Show More
Share by: