Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Let’s Take a Look at Phishing Attacks

Let’s Take a Look at Phishing Attacks

Phishing attacks are growing in number and it presents a major challenge for businesses. The many different forms that these attacks come in just exacerbates the problem. Today, we will take a brief look at phishing to help you educate your staff on what they entail and how to mitigate the massive risk that comes with them. 

Phishing Attacks

A phishing attack comes in as communication from a trustworthy source as to fool the recipient to interact with it. This could be in the form of an email, a text message, a phone call, or really any other form of direct communication. The goal is to manipulate the recipient into providing access credentials to network-attached resources so they can steal data or deploy malware. 

Since phishing can come in several different forms, it is an effective way to breach your network defenses because the scammers are given access, they don’t have to try and outright breach your network defenses, which in many cases are extremely hard to hack into. Let’s take a look at some of the ways these scams are disseminated.

Business Email Compromise

In a business email compromise scam, the scammer will send an employee an email that, at first glance, comes from an authority figure inside of the business. The messages will be quite vague, but direct the recipient into taking some type of action that will allow the hacker to gain access to resources. Many employees will not think twice when their manager tells them to complete a task, so phishing attacks of this type are successful because people don’t take the time to ascertain that the message isn’t actually from anyone. 

Hackers use this method because they work. In Q2 of 2020, successful business email compromise scams averaged $80,193. 

Clone Phishing

One of the most successful phishing scams is using a clone of a message a recipient would have seen before. By gaining access to data beforehand, the hacker can customize a message that looks like one they have received previously. Typically, this type of familiarity removes any suspicion that the message is actually from a scammer. The links are altered to reroute to a site where scammers collect more information. Pretty crafty way to steal credentials. 

Smishing

Email may be the predominant way that phishing is pushed to people, but it isn’t the only way. Smishing attacks are carried out through text messaging. Most people are much less careful about opening and interacting with text messages than they are with their email, and as a result scammers have started pushing phishing messages that look like legitimate messages through SMS. If you also consider that mobile devices often don’t uphold the same security standards that PCs do, users are more vulnerable through an SMS attack. 

Spear Phishing

The spear phishing attack is probably the most dangerous of the phishing scams. First of all it is deliberately designed for a single user. The hacker, in this case, has already done their due diligence and chose their target based on information they already have about the target. Since these attacks take more time to properly execute, spear phishing is typically carried out against high-value targets. The success rate of these attacks are significantly higher than your average, run-of-the-mill phishing attack

Vishing

Another take on phishing, vishing is just phishing over the phone. A scammer will call a target under the guise of a salesperson or finance professional, and because of their perceived legitimacy, the scammer can typically extract information that will help them gain access to computing resources, or at the very least the target's personal or financial information.  

Whaling

Whaling is a phishing attack, typically a spear phishing attack, aimed at business owners, decision makers, and executives at businesses. These attacks, because they are aimed at people who have access to everything, often are well planned; and, if successful often result in the biggest bounty for the perpetrator.

Phishing is a Serious Threat

You need to have a strategy in place to combat phishing as it is not going anywhere, anytime soon. If you would like to talk to one of our consultants about developing a plan to train your people about phishing attacks and what to do if they come across one, give us a call at 800.618.9844 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Internet Hardware Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer IT Services Hosted Solutions Users Collaboration Mobile Device Ransomware Workplace Strategy Quick Tips Cybersecurity Microsoft Small Business Passwords Data Backup Communication Smartphone Backup Saving Money Smartphones Android Business Management VoIP Mobile Devices Managed Service communications Upgrade Disaster Recovery Browser Data Recovery Social Media Managed IT Services Microsoft Office Windows Network Remote Tech Term Internet of Things Current Events Productivity Automation Artificial Intelligence Facebook Gadgets Covid-19 Cloud Computing Remote Work Server Managed Service Provider Miscellaneous AI Information Holiday Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Compliance Government Training Data Management Business Continuity Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Data Security Apps Two-factor Authentication Mobile Office App Employer-Employee Relationship Vendor BYOD Managed Services Voice over Internet Protocol Mobile Device Management Chrome Gmail Budget Apple Networking BDR Applications Computing Hacker Information Technology Avoiding Downtime Access Control Marketing Conferencing Office 365 IT Support Tip of the week WiFi How To HIPAA Router Operating System Computers Risk Management Help Desk Virtual Private Network Website Health Analytics Office Tips Healthcare Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services Solutions Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Cybercrime Windows 11 Physical Security 2FA Monitoring Display Printer Excel Paperless Office Infrastructure Remote Workers Telephone Firewall Document Management Cooperation Free Resource Project Management The Internet of Things Scam Windows 7 Data loss Microsoft 365 Social Employees Robot Customer Relationship Management Integration Settings User Tip Wireless Modem Printing Processor Content Filtering Mobile Security Hacking IT Management YouTube Meetings Holidays Presentation VPN Cryptocurrency Data Storage Smart Technology Supply Chain Wireless Technology Computer Repair Video Conferencing Managed Services Provider Virtual Desktop Saving Time Virtual Machines Professional Services Data storage LiFi Word Managed IT Service Outlook Downloads Machine Learning iPhone Money Licensing Humor Entertainment Vulnerabilities Data Privacy Safety Maintenance Antivirus Sports Mouse Images 101 Telephone System Multi-Factor Authentication Mobility Administration Cost Management IBM Legal IT solutions Directions Videos How To Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Business Growth Notifications Travel Trend Micro Specifications Security Cameras Workplace Strategies Techology Google Maps Microchip Cortana Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Alt Codes Username Downtime Unified Threat Management eCommerce Black Friday SSID Competition Unified Threat Management Hosted Solution Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Typing Proxy Server Reviews Network Congestion Cookies Cyber Monday Medical IT Google Drive User Error User Knowledge Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Point of Sale Shopping 5G Nanotechnology Optimization PowerPoint IP Address Google Docs Unified Communications Experience Addiction Language Employer/Employee Relationships Outsourcing Management PCI DSS Chatbots Navigation Bitcoin Network Management Running Cable Tech Support Gig Economy Monitors Screen Reader Distributed Denial of Service Workplace Google Wallet Computing Infrastructure Teamwork Hiring/Firing Recovery Service Level Agreement Internet Service Provider Regulations Compliance Identity Evernote Paperless Hard Drives Windows 8 Laptop Websites Bookmark Smart Tech Memes Co-managed IT Domains Drones Alerts SQL Server Technology Care SharePoint Electronic Medical Records Download Net Neutrality Financial Data History Business Communications Refrigeration Halloween Browsers Smartwatch Writing Connectivity IT Break Fix Scams Public Speaking Lenovo Azure Hybrid Work Lithium-ion battery Virtual Reality Upload Procurement Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Theft CES Fun IoT Communitications Dark Web Cables Superfish Deep Learning Twitter Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Undo Error Education Data Analysis Social Engineering Star Wars IT Assessment Microsoft Excel IT Maintenance Staff Value Business Intelligence Remote Computing Gamification Flexibility Organization Social Networking Legislation Shortcuts Mobile Computing Tablet Fileless Malware Digital Security Cameras Search Smart Devices Ransmoware Wearable Technology Memory Vendors Application Best Practice Alert Content Remote Working Buisness File Sharing Health IT Dark Data Motherboard Data Breach Comparison Google Play Be Proactive Managed IT

Blog Archive