Important Update! Urgent! Expires in 1 Day! Confirm your Email Now! Your Password Has Been Stolen!
This type of messaging is often used in some of the most disarming phishing emails. As a business owner, you and your staff need to be vigilant when it comes to catching these scams.
When we think about hackers, we always think about technologically brilliant social outcasts sitting in front of half a dozen screens trying to digitally rob banks. That’s a fun way to portray them in television and movies, but these days it doesn’t really take a lot of technical know-how to run the most successful scams in the cybercriminal’s playbook.
In fact, cybercriminals rely less on new breakthroughs and more on new psychological ways to trick users. Why invest all that time and effort breaking through modern cybersecurity protections when you can practically ask a user to hand over their password?
Phishing attacks are prominent today because they work. Users fall for them, and you almost can’t blame them for it. A phishing email is an email that looks legitimate, and is usually spoofing a legitimate site or service.
For example, a phishing email might look like it’s coming from your bank. The from address appears (at first glance) to be coming from a real email address from your bank. It might even get filtered normally, if you already have filters in place to organize email from your bank. Clicking into the email, you’ll see your bank’s logo.
Everything will look very real and very legitimate, at first glance.
That’s why phishing attacks are so easy to fall for.
The email itself usually isn’t dangerous on its own, although it could have links to dangerous sites, or contain attachments that are dangerous. Most of the danger lies in where the email instructs the user to go.
First of all, if an email seems too good to be true, or extremely urgent, or it’s asking for password information that you didn’t trigger, immediately be skeptical.
When in doubt, it’s best to be skeptical of an email. That doesn’t mean email correspondence has to be distrusted though. If your business has a solid spam-blocking solution in place, it can help weed out some (not always all) phishing attacks.
If you are getting suspicious emails and want us to take a look, give us a call at (509) 534-1530.
About the author
Sam is a network engineer with a broad range of experience spanning more than 35 years. He wrote is first piece of code in 1979 and has been involved with the industry ever since. For the last 20 years, he has worked for SCW Consulting where he has embraced his passion for network technology and security.
Mobile? Grab this Article!