Search Results for:

Shark Blog

The Art of Phishing: How Cyber “Sharks” Hook, Line and Sink Their Victims

Unsuspecting users around the globe are becoming easy prey to increasing cyber security threats. A task as simple as checking your email inbox is no longer the innocent act it once was. In light of Shark Week, VPLS wants to remind you of the danger lurking in the sea of data that is phishing. Here is an excerpt to help you identify and protect yourselves from becoming cyber shark prey.

The Art of Cyber “Shark” Phishing

There is nothing quite like fishing: an open ocean, a fishing rod, and patiently waiting for your catch to take the bait. And there’s no greater feeling than discovering you’ve caught something worthwhile.

The art of email phishing is no different. However, in this scenario, the ocean is made up of thousands of email accounts with cyber “sharks” always lurking ready to attack.

On a daily basis, employees sit down at their desk with a hot cup of coffee and begin sorting through dozens of emails. Suddenly, an employee notices an important message from Human Resources (HR). The message directs the employee to a link and asks that the user update their current personal information. Without a second thought, the employee completes the task and discovers that all linked work accounts have been infected with malware. One by one, work files are disappearing, as the culprit basks in their latest catch.

It Looks Like a Fish! Swims Like a Fish! But… is it a Phish?

Phishing emails usually hide behind familiar and reputable company brands, which explains why many of us fall prey to this tactic and relinquish personal information.

By understanding the victim’s trends and habits, scammers can obtain personal information by impersonating corresponding banks or organizations, claiming to verify customer records due to a technical error. This type of phishing, known as Whaling and Spear Phishing, specifically targets large businesses and organizations due to the large number of customers available.

Cybercriminals can also use the pharming technique, where they lure their victims with a promise of a prize, if they fill out a survey form with necessary information. Another way this tactic is put into practice is when the scammer leads their victims to a phony version of a legitimate website, that a user is trying to visit by infecting their computer with malware. The malware then redirects the user to the fake website even when the correct address is inputted.

 

Phishing 101: How-To Recognize a Scam

Real company emails never request sensitive and personal information.

Beware of emails with links or attachments that ask for passwords, credit card information, credit scores or other personal information.

Real company emails address you by your full name

Phishing emails typically use generic greetings like, “Dear Customer,” “Dear Account Holder,” or “Dear Valued Member.”

Real company emails have proper domain names.

Check the sender’s email address to ensure legitimacy. Emails with alterations to the domain address, such as additional letters or numbers, are typical signs of fraudulent accounts.

Real company emails don’t have poor grammar.

Bad grammar in an email is a sure sign that you are dealing with a scammer, as most company emails are heavily scrutinized and edited before release.

Real company emails don’t force you onto their website.

Some phishing emails are coded in a way that forces a browser to open and automatically opens a specific website.

Real company emails don’t include unsolicited attachments.

Unsolicited emails containing attachments are typically sent by hackers as a way of downloading malware onto your computer.

 

Stay Vigilant

Learning and knowing more about email phishing can make all the difference when trying to distinguish what is phish bait and what isn’t. Lucky for you, VPLS, offers KnowBe4 Security Awareness Training Services to train your employees to efficiently identify a red flag in real life situations to prevent potential cyber “shark” attacks.

So, the next time you are faced with a questionable message in your inbox, remember these guidelines and you may avoid becoming a victim of someone else’s phishing game.

[av_hr class=’default’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’ custom_class=” admin_preview_bg=” av_uid=’av-m7niqe’]

Follow, Like & Share!

Don’t forget! VPLS offers Knowbe4 services that will help train your team to identify, flag, and prevent phishing emails from entering your organization. If you want to keep up with the latest security trends and other IT related products and services, please visit our blog and stay current with the latest news!

Firewall Banner 1280x802

VPLS Basics: What is a Firewall and How Does It Work?

VPLS Basics: Firewall Security

As technology develops and improves, so do the threats against your security structures and private information. For this reason, it’s become second nature to check for updates and install the latest software patches and firewall upgrades. But, how exactly does a firewall keep you safe from ongoing cyber threats from across the globe?

Take a closer look into understanding how one of the most vital tools against cyber security threats keeps you and your information safe from unsolicited visitors.

Olympic Logo 1280x640

The Winter Olympics: A Cybercriminal’s Wonderland

Go for the Gold in Cybersecurity During the Winter Olympics!

As attendees from across the world focused their attention towards their favorite Winter Olympic team, another group of individuals seized the opportunity and focused their attention towards taking home their version of the Olympic gold: your personal information. 

Let’s dive into the tricks and techniques of these cybercriminals and how they earned their “winnings” during the Winter Olympics 2018 in Pyeongchang, South Korea. 

JFK

VPLS Basics: A Presidential Lesson on Leadership Skills

 

Lessons from Past Presidents on Leadership Skills

Yes, President’s Day is here! While you could simply use this day to whip out coupons and buy yourself that espresso machine you’ve been eyeing for weeks, today is also a great opportunity to reflect on the leadership skills that many of our nation’s Presidents came to inherit. So, what characteristics or skills does it take to become a successful U.S. President? Let’s take a look!
Water Paint Dog Artwork

Happy Lunar New Year 2018!

The Beginning of the Lunar New Year!

Colorful decorations bathe the streets in bright reds, yellows, and gold, as Asian communities across the globe are bursting with excitement and festivities in welcoming the new year. And accompanying the Spring Festival is none other than the 11th Chinese zodiac symbol, the Dog.

Let’s dive into the role that this four-legged friend plays in Chinese culture!

Robot Love 1920x1440

Top 5 Tech Trends for 2018! Let’s Have a Heart-to-Heart!

Happy Valentine’s Day!

Whether or not you’re a fan of Cupid’s arrow, this day is here to remind us of the value in communication. The methods of communication have greatly changed over time. Love messages once came in the form of a letter. Now, technology has evolved even further as our means of communication spread across various social media outlets and mobile applications. Let’s take a look at recent tech trends that will change the way we communicate in 2018.
Scroll to Top