What is Phishing?

 

According to Wikipedia, Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details or other sensitive details, by impersonating oneself as a trustworthy entity in a digital communication.

We’ll touch on the 11 different types of phishing methods and how they can affect you and your business.

phishing.png
 
 
background_2.jpg
 

11 Common Types of Phishing

 

Standard Phishing

The attempt to steal confidential data but pretending to be an authorized person or organization.

Malware Phishing

Using the standard phishing method and enticing the user to click a link or open an attachment, except the message is embedded with bugs harmful to your device.

Spear Phishing

An attack targeting a high-dollar individual (like a CEO) using publicly available information - which in many cases proves to be very convincing.

SMS + Phishing = Smishing

A phishing attack using SMS or text messages to deliver malicious links.

Search Engine Phishing

When users search for something online, they’ll often come across ads that look like the real thing, but most times are riddled with malware and bugs when clicked on.

Voice Phishing = Vishing

Attacks via phone calls, where an actor will call pretending to be from a reputable organization trying to extract personal information like banking or credit card information.

Pharming

A sophisticated form of phishing involving the internet’s domain name system (DNS). It reroutes traffic to a spoofed page that looks like the real thing without the user ever knowing, and in hopes to steal valuable information.

Clone Phishing

Attacks of this nature occur when the attacker has access to a compromised email account. They will then make changes to an existing email message/thread and send that message out with a link that looks legitimate but is actually embedded with malware.

Man-in-the-Middle

This type of attack involves areas where public WiFi is available. The attacker will create a phony public WiFi network in hopes that surrounding users will connect to that network, where the man in the middle can then phish for information or push malware onto the unsuspecting users’ device.

Business Email Compromise (BEC)

A fake email which usually claims to be an urgent request for payment or purchase from someone within their own company (ex: their supervisor or CEO).

Malvertising

Phishing that involves embedding malicious code within advertising or animations seen online, usually placed on a legitimate website.

 
 
 

 
 

Why Humans?

48% of hackers and incident respondents spend 1-5 hours per week keeping up with security news, trends, and technologies. Technology is a reactive way of thinking, so how can we compete? We need to take a proactive approach to cyber security to stop cybercriminals in their tracks by strengthening employees - your first layer of defense.

 
 
 
background_1.jpg

How Can We Help You Protect Yourself?

 

Dark Web Domain Scan

With password reuse and social engineering attacks running rampant, having credentials associated with your organization on the dark web can put your organization at increased risk of becoming a target.

What can we do?

Initial scan of your domain status on the dark web - Evaluates vulnerabilities presently facing your organization


Baseline Phishing Assessment

Phishing has become the #1 attack method of choice for cybercriminals due to its high success rate. According to the Ponemon Institute, organizations see a 64% improvement in phishing click rates with a security training program.

What can we do?

Phishing campaign sent direct to your employees - Evaluates their ability to detect a possible cyber attack


Annual Security Training

92% of data breaches are caused by human error. Cisco says, "Companies shouldn't just throw technology at the problem. Up-skilling users and making them more cyber-aware is vital."

What can we do?

45-minute annual Security Awareness Training course – Reduce employee-induced errors with cybersecurity training. Includes a quiz and printable certificate upon the employee’s successful completion.


Continuous Education Available

Annual security training is a great way to cover the basics of cybersecurity, but repetition equals retention. Ongoing education is key in a robust cybersecurity program.

What can we do?

We offer an ongoing education solution – Weekly mini-security training video, monthly security newsletter, continuous phishing and dark web monitoring, an Employee Vulnerability Assessment, & more!

 
 

Cybercriminals leverage the path of least resistance, humans, to make their way into a network.

We can help you assess where your human vulnerabilities lie, and establish cybersecurity throughout your organization.

Contact us today to get your Free Dark Web Scan

 
background_2.jpg