Phishing attempts have one thing in common – they prey on our natural human tendency to trust people and companies. Well-designed attacks can lead people to ignore small suspicions, especially when they think they’re helping the company by paying invoices, updating login details, or sharing access to requested data.

Click on the image to see the full version

Cybercriminals use more than deceptive emails to steal sensitive information from people. Phishing can take on lots of forms, including fake websites, demanding voicemails, fake emails from someone posing as an executive, phony links, dangerous downloads and more.

You play an important role in protecting the data of our guests, employees and partners. Understanding the threats will help you stay alert so you can keep your online activity safe and secure.

Phishing can take on lots of forms, including some of the following you might experience:

  • Evil Twin WiFi: Fake WiFi access points
  • Fake Websites: Hackers create phony websites that look just like a popular company’s website
  • Link Manipulation: Emails urge you to click on odd links to visit a familiar website
  • Malware: Often embedded as a link or attachment that, when clicked, installs software that mines the computer and network for information
  • Malvertising: Online advertisements or pop-ups that install malware on computers through links
  • CEO & Coworker Fraud: Emails that look like they are from your CEO or co-worker asking you to click on a link to approve a document, transfer funds or buy a gift
  • Spear Phishing: Criminal’s send messages with your name and personal details to obtain sensitive information
  • Mobile Phishing (smishing): Text messages that include links, videos or messages asking for personal information or urging you to download something onto your phone
  • Voice Phishing (vishing): A phone caller leaves strongly worded voicemails urging the recipient to call another phone number
  • Session Hijacking: A sophisticated technique that happens when criminals hack into valid computer sessions to steal information stored on the server

Thank you for your role in keeping us cybersecure.

Like
Like Love Haha Wow Sad Angry
7

		
	
		

Leave A Reply