Categories: Security

5 Things You Can Do to Prevent Phishing Scams at Work

Phishing attacks on businesses are on the rise: the FBI reports that businesses worldwide have lost more than $5 billion over the last several years because of this trend. Hackers are typically able to gain access to a business’ computer system through their employees, by targeting individuals with social engineering scams through phishing or by collecting personal information from their social media profiles. You can use the Anti-Hacking feature to block phishing attempts on your work phone:

Anti-Hacking will block you from malicious websites and warn you of deceptive websites. It’s important to stay protected from scams across devices since you’ll likely check emails throughout the day on your work or personal phone. After all, you don’t want to be the weak link at your company — the individual whose oversight leads to a company-wide breach. The following are additional ways you can protect yourself from phishing scams at work.

Read More: How to Protect Yourself from Social Engineering Attacks

  1. Follow the Strong Passwords and Use Two-Factor Authentication Rule

Your IT department will prompt you to create strong passwords and use two-factor authentication for your professional accounts. Don’t ignore this request, as this is how many companies are breached — employees who ignore this or put it on a to-do list but don’t follow through. Strong passwords are long passwords with lowercase and uppercase letters, symbols, and numbers. Also, apply the same rule to your personal accounts.

  1. Be Wary of What You Send Via Email

Email is not a secure form of communication for many reasons, one being that it’s easy to intercept emails. Don’t send any personal information via email or email forms (such as passwords or your Social Security number).

  1. Be Suspicious of Unsolicited Emails and Phone Calls

Some unsolicited emails and phone calls are legitimate — but many are not. Many phishing scams are designed to prey on your emotions, and get you to respond with personal information or click on a link out of fear. This approach works, too: it is often most successful when the targeted individual is experiencing personal trouble or hardship, which the hacker can gather from stalking the victim’s social media profiles.

  1. Be Skeptical of Emails From Trusted Sources

You should be skeptical of all emails you receive — even if they’re seemingly from a friend, coworker, or your bank. Phishing scams are getting cleverer by the day, and many scammers are able to spoof emails from people you know or else compromise a known, trusted email address. If the language in the email feels “off” or strange — and if that language is accompanied by a link, attachment, or a request for personal information — ask yourself if the email seems legitimate. If you have doubts, reach out to the sender by another form of communication and ask if they sent the email. If you’re at work, alert your IT support department right away.

  1. Don’t Mix Business With Pleasure

Be cautious about what you post on social media, especially when it comes to information related to your job. Hackers are more frequently targeting employees’ social media profiles in order to collect personal information that could provide answers to job-related security questions or passwords.

PSafe Newsroom

The dfndr blog is an informative channel that presents exclusive content on security and privacy in the mobile and business world, with tips to keep users protected. Populated by a select group of expert reporters, the channel has a partnership with dfndr lab's security team. Together they bring you, first-notice news about attacks, scams, internet vulnerabilities, malware and everything affecting cybersecurity.

Recent Posts

Vulnerabilities in Cyber Security: what they are and how to fix them?

Learn all about one of the hackers' favorite breach method and keep your company safe…

1 year ago

3 ways to recover deleted photos on Android

Have you ever wondered how to recover deleted photos on Android? After all, the lack…

1 year ago

What is worm?

Digital worms are among the most serious threats in the wild kingdom of the Internet.

2 years ago

Spoofing: What’s it all about?

Spoofing is a fairly sophisticated virtual scam that can fool even the most cautious and…

2 years ago

Careful With That QR Code! Five Steps For QR Code Safety

Five Steps to Reduce QR Code Risk! Step one? Read this article…

2 years ago

Pharming: Phishing’s Nasty Big Brother

Pharming is creating a new, dangerous brand of impostor syndrome. Check how to avoid pharming…

2 years ago