.国产短视频

国产短视频

Corporate Training and Professional Education

An Office of University Community Partnerships

News

A credit card on top of a laptop keyboard with a fishing hook in it

What Is Phishing and How Can You Protect Yourself?

Ever receive an email from a company that sets your internal warning system on high alert? Maybe the sender鈥檚 email address is irregular, or they鈥檙e threatening to cancel your account, or the email is riddled with spelling errors. Those alarm bells aren鈥檛 paranoia 鈥 chances are, you鈥檝e been targeted in a phishing attack, one of today鈥檚 most common cybercrimes. Keep reading to learn how to protect yourself from phishing.

How Victims Get Hooked

Despite the play on words, phishing is anything but cute. It鈥檚 a technique perfected by hackers (typically using email or text messages) to con you into providing your personal information or account data. They may try to steal your passwords, account numbers, or Social Security numbers, and if they get that information, they could gain access to your email, bank, or other accounts.

Typically, scammers will send emails and text messages that look like they are from entities you know and trust, like your credit card company, an online retailer, a payment app, or a social networking site. These messages try to coax you into clicking on a link that leads to a malicious website or downloading an attachment that contains a virus or malware.

To coerce recipients into taking immediate action, these messages may use a variety of tactics:

  • Say they鈥檝e noticed some suspicious activity or log-in attempts on your account.
  • Threaten to close your account if you don鈥檛 resolve a problem.
  • Claim there鈥檚 an issue with your stored payment information.
  • Say you must confirm some personal information.
  • Attach a fake invoice or receipt.
  • Ask you to click on a link to make a payment or update payment information.
  • Say you鈥檙e eligible to register for a refund.

How to Avoid Taking the Bait

The most crucial step in eluding a cybercriminal鈥檚 net is to recognize fake emails and texts before you unwittingly provide sensitive personal data. If you notice something fishy, delete the email or text instantly. Keep in mind that legitimate companies typically will not perform suspicious activities:

  • Request sensitive information (like your Social Security number) via email or text.
  • Address the recipient with a generic salutation like 鈥淒ear Valued Customer鈥 instead of name.
  • Send emails from an alternate domain (e.g., order-update@amazon1234.com instead of order-update@amazon.com).
  • Send emails or texts that contain misspellings and bad grammar.
  • Send unsolicited attachments.
  • Use links within the message that point to alternate websites (e.g., www.amazon123.com instead of www.amazon.com). 

If you鈥檙e not sure whether an email or text is authentic, contact the company using a phone number or website that you know is legitimate. Do not open any attachments or click on any links in the email until you know it鈥檚 real.

, there are four additional steps you should take to protect your data in case you accidentally fall for a phishing scam:

  1. Protect your computer by using security software. Set the software to update automatically so it can deal with any new security threats.

  2. Protect your mobile phone by setting software to update automatically. These updates could give you critical protection against security threats.

  3. Protect your accounts by using multi-factor authentication. Some accounts offer extra security by requiring two or more credentials to log in to your account. This is called multi-factor authentication. Multi-factor authentication makes it harder for scammers to log in to your accounts if they do get your username and password.

  4. Protect your data by backing it up. Back up your data and make sure those backups aren鈥檛 connected to your home network. You can copy your computer files to an external hard drive or cloud storage. Back up the data on your phone, too.
     

How Often Hackers Lure Their Victims

Bad actors are rapidly increasing the frequency of their attacks, so protecting yourself from phishing is more important than ever.

According to the FBI, the Internet Crime Complaint Center (IC3) . Phishing was the most prevalent threat with 241,342 victims who had losses of over $54 million. Other types of cybercrimes followed close behind:

  • Nonpayment/nondelivery: 108,869 victims
  • Extortion: 76,741 victims
  • Personal data breach: 45,330 victims
  • Identity theft: 43,330 victims 

Taken in total, these numbers represent a 69 percent increase in complaints from 2019. Cyber criminals had a good year, with many taking advantage of the unusual events that transpired in 2020, including the rapid transition to remote work. According to Malwarebytes, 20 percent of companies surveyed said they experienced a security breach as a result of a remote worker.

Use the techniques above to recognize and prevent phishing attacks. 国产短视频can also help you take a deeper dive into the subject with the online Cybersecurity Essentials course. This quick, affordable program identifies important cybersecurity practices for anyone securing information or conducting business online, and it can arm you with the tools to stop cybercriminals in their tracks. For more information, reach out to us at CE-Inquiries@usf.edu.

Return to article listing

Category

About Corporate Training and Professional Education

国产短视频Corporate Training and Professional Education empowers people to craft their future without limits through engaging professional growth learning and certification programs. Its programs focus on an array of topics – human resources, project management, paralegal, process improvement, leadership skills, technology, and much more.