National Cybersecurity Awareness Month

National Cybersecurity Awareness Month 2020

October is another month to have National Cybersecurity Awareness Month. It is another month of insight sharing for tips and more awareness.

Thankfully, the Vanderbilt University Information Technology shares their tips. Their tips center on how to enhance the user’s email protection from phishing. This is surely a great share for the National Cybersecurity Awareness Month.

Email Phishing

Email remains to be the most used communication platform in the business. While it is true that many messaging platforms now exist. But, email remains to be the best option.

However, this best option presents to be also the scammer’s best option. Yes, their best window of pushing data breach into systems and networks.

Email phishing is when an attacker sends a malicious email to the target. But, this is not mostly appearing to be malicious. Because these emails look professional. At a glance, you sure don’t see the intent. 

But, the goal of this attack is for user’s accounts to reveal confidential information. These emails are cunningly formatted to lead a user to click and download links. These links will therefore lead them to gain access to your sensitive information. Also, they can infect your computers and the networks connected- through these links.

Phishing Emails Can Steal:
  • Your credentials
  • Credit Card Information
  • Banking Details
  • Internal Data
  • PII (Personally Identifiable Information)
  • Medical Information

Of course, these are cunning ways of spreading malicious intentions. But before, these scammers used to be direct. It used to be effective. But today, these attackers are more sophisticated in their ways.

Because Of This, They Can Do Phishing Through The Following:
  • Malicious links
  • Malicious attachments
  • Email impersonation
  • Account compromise

Kinds Of Phishing

Spear Phishing

This is a direct phishing campaign. This targets a specific individual.

Whaling

On the other hand, whaling focuses on high-end professionals in the business.

Clone Phishing

Also, another kind is clone phishing. It ‘clones’ a legitimate email. Or in other words, it copies these emails and makes it appear truly identical. But these emails have malicious content. This can have links or attachments that lead them to their target.

Vishing

This is an audio format of phishing. What scammers do is use phone calls. It’s either they leave voice messages, or they call users. Again, their goal is for these users to reveal their sensitive personal information.

Smishing

Also, smishing is the text format of phishing. This is a scammer’s another bait to lead users into revealing their information.

Certainly, phishing comes in many ways. And, it doesn’t only exist in the form of emails. It can vary from text to phone calls. Thus, being knowledgeable enough should equip each to be less vulnerable.

What You Can Do

So, what if you spot a phish?

Immediately report the phish. If you are using Outlook, there is an option ‘Report Message’. Choose that button. Them, select phishing as your report.

On the other hand, if you’re not using Outlook you can do this. What you can do is you can forward the email as an attachment. And send it to this email address: [email protected].

Click to rate this post
[Total: 0 Average: 0]
Scroll to Top