5 easy ways to protect yourself from phishing
- delhitrainingcours
- Apr 18, 2020
- 4 min read

With these tips, you should no longer have a problem identifying phishing attempts.
As revealed earlier this year, a report by the Anti-Phishing Task Force (APWG) there has been a noticeable increase in the number of phishing campaigns . This is a widespread problem, which represents a huge risk for individuals and organizations (for example, there were more attacks in the first quarter of 2016 than in any other quarter in history).
Also Read: All About Cyber Security and Cyber Threats
Needless to say, this is something we should all be aware of, as these types of attacks are not going to go away anytime soon. But don't worry, this top 5 will help keep these criminals at bay. Before tackling this question, here is a brief overview of what phishing or phishing is (for more details, consult this expert opinion section ). In short, it is an identity theft technique in which cybercriminals attempt to trick users into transmitting personal and sensitive information (without their knowing it consciously). Interestingly, phishing - in one form or another - has actually existed for many years in the form of phone calls and attempted scams by mail.
Also Read: The Planned boom in IOT
Usually, cybercriminals launch their phishing attacks after the personal data leak. This was the case with data leaks from Anthem and eBay companies, where criminals sent alerts to their users advising them to change their passwords (but by directing them to a fake website intended to collect their information).
Also Read: How to Fix Security Holes
According to some cybersecurity experts, phishing is considered a reliable (and easy) method by cybercriminals to enter a corporate network and launch more sophisticated attacks. Employees are, after all, increasingly perceived as the weak link ( internal threats are a big problem ) and therefore the most effective target for criminals who seek to infiltrate a business or SME.
Also Read: What is Cyber Crime and Dark Web
Here are our 5 tips to detect and protect yourself as best you can from phishing attempts.
1. Prudence is the mother of safety
You can greatly reduce the risk of being the victim of a phishing attempt by being careful while browsing and checking your emails.
First, as ESET security researcher Bruce Burrell advises, think twice before clicking on links, downloading files, or opening attachments in emails (or social media), even if it seems to come from a reliable and known source.
Never click on links in an email to a website unless you are absolutely sure it is authentic. If in doubt, open a new browser window and type the URL in the address bar .
Also, beware of emails asking for confidential or bank information. Legitimate organizations, including your bank, will never ask you to communicate your sensitive information directly by email.
2. Beware of shortened links
Pay attention to shortened links , especially on social media. Cybercriminals often use them - from Bitly and other shortening services - to make you believe that you are clicking on a legitimate link, when in reality you will be redirected to a fake site.
Always hover over the web link (s) in an email with your mouse. This will ensure that the link displayed in the message corresponds to the one to which you will be redirected.
Cybercriminals can use these "bogus" websites to steal your captured personal data, but also to carry out an attack by accidentally downloading files, thereby infecting your computer with malware.
3. Does this email appear suspicious? Read it again!
Most phishing emails are fairly easy to recognize. They are punctuated by numerous typos, capital letters and exclamation marks. They can also contain an impersonal greeting - think of these greetings "Dear Customer" or "Dear Sir / Madam" - or present implausible and generally surprising content. In addition, cybercriminals often make mistakes in these emails ... sometimes even intentionally to get through spam filters, improve the response rate and filter the "smart" recipients who will not fall into the trap.
There is a rumor that the infamous Chinese Unit 61398 is specifically studying user openings and interactions with their worst phishing emails.
4. Beware of injunctions and emergencies
Sometimes, a completely trustworthy company can solicit you on an urgent subject or problem. For example, in 2014, eBay asked its customers to quickly change their password after a data breach . However, this is an exceptional case. Usually, threats and / or urgent requests - especially if they come from a seemingly legitimate company - are a likely sign of phishing.
Some of these threats may take the form of a fine or advise you to do something to prevent the closure of your account. Do not panic and contact the company separately via a known and secure channel.
5. Secure your web browsing with HTTPs
When possible, only connect to secure websites (indicated by https: // and a lock icon in the browser's address bar), especially when communicating confidential information online, such as details credit card.
Never use an unsecured public Wi-Fi network for banking, shopping or entering personal information online ( convenience should not take precedence over security ). If in doubt, preferably use the 3 / 4G or LTE connection of your mobile.
As such, it is now easier to spot dangerous and uncertain websites - Google, for example, informs its users by pointing out sites that do not offer adequate protection .
Opmerkingen