Skip to main content
HomeThe Web Writer Spotlight

- News, tips, inspiration you can trust to thrive in today’s digital age.

Search form

Main menu

  • Home
  • News & Features
  • Business & Economy
  • Tech & Trends
  • Health & Style
  • Arts & Culture
  • Contact Us
 

Latest stories


5 Ways Teachers Can Improve Their Classroom Management

Samantha Higgins June 5, 2023
CLASSROOM MANAGEMENT
Image for 5 Ways Teachers Can Improve Their Classroom Management

Regardless of the grade you teach, it is not easy to manage a classroom full of kids. However, teachers can still improve their classroom management and ensure they're successful at their job.

How to Use Chat GPT for Writing Excellent Content (Tips & Best Practices)

Adam Driver June 5, 2023
CHATGPT CONTENT
Mobile Phone ChatGPT - Image for How to Use Chat GPT for Writing Content – Tips & Best Practices
Chat GPT can generate any content from articles to social media posts, emails and product descriptions. But it’s important to follow some best practices when using the tool.

Did You Know Businesses Can Gain More from PPC Ads Than Blogging & Social Media?

Christopher Pappas June 4, 2023
PPC ADVERTISING
Image for Businesses Can Gain More from PPC Ads than Blogging and Social Media Posting
Choosing PPC and referral marketing over blogging and social media marketing could just be the best move for your business.

How to Build a Data Strategy for Your Business (And Why)

Krishna Reddy June 3, 2023
DATA STRATEGY
Image for How to Build a Data Strategy for Your Business (And Why)

A solid data strategy can add immense value to your business, startup and profession, if you know how build it and leverage the insight it provides.

Are Infographics Effective in the Classroom?

Alexis Davis June 2, 2023
EDUCATIONAL INFOGRAPHICS
Teacher Standing Kids Classroom - Image for Are Infographics Effective in the Classroom?
If you're a teacher, how do you make your lessons more engaging, clear, and comprehensible? With a great educational infographic, of course! Yes, infographics are very effective in the classroom.

Pagination

  • (Page 1)
  • Next page Next ›

Contributors blogs


Blog here »

Image for Productivity vs. Efficiency: What’s More Important?

Productivity vs. Efficiency: What’s More Important?

Meera Nair

 


Why More and More Businesses Are Choosing Two-Wheelers for Delivery

Kartik Pandey

 


woman-studio-doodling-drawing-good-for-your-mind

The Benefits (& Science) of Doodling for a Healthy Brain

Vince Nero

 


How to Decide If You Should Invest in Cryptocurrency

Samantha Higgins

 


How Revenue Intelligence Drives Predictable Revenue

Isaac Garcia

 


Open Floor Plan: Why You Should Consider It and Tips to Create One in Your Home

Gary Braun

 


5 Social Media Marketing Tips to Earn More Brand Love & Customer Loyalty

Suzanne Elly

 


 

Common Types of Phishing Attacks and How to Prevent Them

Ayman Totounji December 14, 2019

ayman-totounji.png  CEO of Cynexlink, Managed IT Service Provider.

  WWS contributor.

hor-z.png

Phishing attacks are showing no signs of slowing down. According to a 2019 Phishing Trends and Intelligence study by PhishLabs, phishing attacks grew 40.9% in 2018, with 83.9% of attacks targeting five industries: financial, email, cloud, payment, and SaaS services.

While credentials for those five industries are the most frequently targeted, the cyberattacks are expanding beyond their focus on mainly targeting certain organizations, specifically online service providers, financial companies, and cloud and document holding firms.

The increasing number of phishing attacks represents a huge danger to all internet-based businesses. It's important for all organizations, business owners and managers to understand and identify phishing scams quickly in order to protect their business data and private information.

To help you combat the phishing attacks menace, here’s a list of five common types of phishing attacks and tips to prevent them:

 

1. Deceptive Phishing

 

This phishing attack is the most common type of phishing assault. In this kind of ploy, fraudsters imitate a real organization trying to take individuals' login credentials or personal information.

Those emails often use a sense of urgency or threats to make the users panic and do what the hackers want. For instance, PayPal con artists could send organizations a phishing email that instructs the receivers to tap on a link to identify a disparity with their online account. 

But that link redirects the receiver to a fake PayPal login page that gathers the victim's data, such as login details that is the sent to the attackers. The phishing attack's success rate depends on user's level of alertness and how closely a scam email imitates the authentic correspondence from the targeted organization.

To protect your organization and personal information from such attacks, you must access all URLs carefully to check whether they redirect you to some other suspicious site.

Also, look for grammar mistakes, generic salutations, and spelling errors throughout the email to detect fraud messages.

common_phishing_attacks.jpg

 

2. CEO Fraud

 

In some cases of phishing, fraudsters can decide to conduct CEO fraud. It is also known as business email compromise (BEC) phishing.

In the CEO fraud, hackers use compromised email accounts of company CEOs or other higher-level executives and officials to approve false wire transfers to the financial institution of their choice.

The fraudsters can also use those compromised email accounts and email records to carry out W-2 phishing in which they demand W-2 data for all workers with the goal of filing fake IT returns on their behalf, or to post that information on the dark web.

This type of whaling assaults often succeeds where higher-level officials don't take an interest in security awareness training with their workers.

To counter the risks associated with CEO frauds and W-2 phishing, businesses should require all of their workforce—including top executives—take regularly scheduled security awareness training.

Organizations must also consider infusing multifactor authentication (MFA) ways into their monetary approval process so that nobody can authorize payments using email alone.  

 

3. Smear Phishing

 

Not all phishing attacks use "spray and pray" methods to find easy targets. A few of them also depend on individual contacts, or they wouldn't be as successful otherwise.

Thus enters smear phishing cons.

In this type of phishing, fraudsters tweak their fraudulent messages with the target's name, company, position, work telephone number and other data in a ploy to fool the recipient into believing they know the sender. The objective is the same as deceptive phishing—they also trick the receiver into clicking on malicious attachments or URL in the scam email.

To combat such phishing emails, organizations must conduct constant security awareness training for their employees. Such training is important to enlighten employees on the scams and dissuade them from posting personal information, company executives records, and other sensitive corporate data on public forums like social networking sites.

You should also invest in anti-malware measures for analyzing inbound emails to identify and flag malicious email attachments and links from scammers. This solution helps identify indicators for both zero-day threats and known malware.

 

4. Vishing

 

Up to this point, we've talked about phishing attacks that depend exclusively on email as a method for correspondence. Email is without a doubt a prevalent tool among cybercriminals. All things considered, though, fraudsters also go to other media to execute criminal activities.

Take vishing, for instance. This sort of phishing attack does not involve sending an email, but rather goes for placing a telephone call.

In this type of scam, an attacker may execute a fraud by setting up a Voice over Internet Protocol (VoIP) server to imitate different entities so as to steal your sensitive information or funds.

Vishing attacks have taken on different structures over time. In September 2019, for example, Info Security Magazine detailed that some digital hackers deployed a vicious vishing attack in an attempt to steal the passwords of UK MPs and parliamentary staff members.

Not long thereafter that audicious attack, other prominent organizations and institutions have also been targeted. The Next Web was attacked by vishers who masqueraded as the boss of their German parent company, tricking a UK subsidiary firm approximately $243,000. 

To secure your business against such vishing attacks, educate your clients not to act on calls from unknown telephone numbers purporting to be your company. Also avoid giving any personal information via a phone call. And use a caller ID app to identify callers and avoid the scams.

 

5. Smishing

 

Vishing isn't the only form of phishing that digital fraudsters can execute through a telephone. They can also conduct other types of telephone fraud attack known as smishing.

This particular type of phishing attack uses malicious and deceptive text messages to fool users into calling back, tapping on a malicious link and or providing their personal information. Like vishers, smishers pose as different entities to get what they want.

Back in February 2019, for example, Nokia cautioned its customers to beware of a smishing campaign where digital cybercriminals acted like the Finnish global telecommunications and conveyed text messages advising clients that they had won a vehicle or cash. The scam on-screen texts at that point asked recipients to send over cash as an enlistment installment for their new vehicle.

Later in the year, WATE published the story of a Knoxville, TN woman who fell for a smishing attack. The lady had cancer and the smishers mercilessly claimed that she could get a government award to help her in paying for her treatment. But for the award, fraudsters asked her to first make a down payment and also pay for the grant's taxes.

You can defend yourself against smishing assaults by researching the unknown telephone numbers and calls online. Call the organization named in text messages to ensure their authenticity.

Conclusion

Businesses can easily spot common types of phishing assaults by following the tips in this guide. However, that still doesn't mean you will always be able to detect every single phishing attack.

Phishing attacks are continually evolving, taking on new structures and procedures. You need to arrange regular security awareness and training programs so that both employees and executives are up to speed on the latest phishing tactics and stay a step ahead of cybercriminals.


Ayman Totounji is the CEO of Cynexlink, a Managed IT service provider company that helps small and mid-sized companies by delivering technology solutions like cybersecurity, Managed IT services and cloud computing.


 

Related stories

 

The Most Serious Cybersecurity Concerns Threating Businesses Online

Protect Yourself from the Scary World of Online Identity Theft

Cybersecurity Facts You Need to Know to Protect Your Business

Perfect Security Plan for Your Business

Understanding SSL Certificates: How They Protect Websites & Data Online

Telltale Signs It's Time to Move Your Blog to Better Web Hosting

Best Ways to Keep Your Online Transactions Secure

 

Share this article

  • facebook
  • twitter
  • linkedin
  • pinterest
  • pocket
  • email
  • hackernews
  • reddit
  • tumblr
  • whatsapp

bg_carousel_header_0.png

GET OUR FREE DAILY NEWSLETTER  newsletter icon.png

Subscribe for new content updates, tips, & inspiration in your inbox.

bg_carousel_header_0.png

 

You might also like...

flat-design-video-production-animation-banner

Why You Should Invest in Animated Explainer Videos for B2B Marketing

female-coder-programmer-coding-skills

Why Coding Is Still One of the Most Important Job Skill for the Future

Say Goodbye to the 9 to 5: The Best Freelancing Jobs Right Now

Can Bed Bugs Cause Mental Health Issues?

Has Your Company Outgrown Its Office Space? Here's How to Know

The Wrong iPhone 14 Plan Could Cost Individuals $1,146, Families $5,013

 

Join over 20,000 Subscribers!

Follow for new content updates, tips, & inspiration delivered straight to your feed.

twitter.gif linkedin-gray.jpg email.gif RSS feed

 

 

 

 

 

 

Most read this week


writers-outdoors-writing-using-vintage-typwriter-issues-affecting-writers-in-the-21st-century
The Main Issues Writers Are Facing in the 21st Century
Marie Barnes

5 Ways to Best Prepare for a Remote or Hybrid Job Interview
Nick Herschel

Mobile Phone ChatGPT - Image for How to Use Chat GPT for Writing Content – Tips & Best Practices
How to Use Chat GPT for Writing Excellent Content (Tips & Best Practices)
Adam Driver

Small Businesses Waste 56.4M Hours a Year Chasing Late Payments, Study Finds
Carlotta Saxton

 

Got a story or tip for us?

 

Tips_0_0_0.png

Here's how to submit it →

 

 

 

Like this content?

Subscribe for new content updates, tips, & inspiration in your inbox.

 

EXPLORE MORE ...

black-nav-bar1.png

News & Features ›


Study Reveals the Countries Most Interested in Cryptocurrency, and Biggest Concerns

November Is America’s Worst Month for Businesses to Achieve Unicorn Status

agribusiness-and-farming-trends-shaping-our-worl

10 of the Biggest Agribusiness and Farming Trends Shaping Our World


How to Protect Your Business from Disasters With a Force Majeure

How the Internet Has Revolutionized Industries and the Way We Live

Ed Sheeran’s Guitar Makers ‘Sheeran by Lowden’ Range Launch on Amazon in U.S

Benefits of a Second Citizenship (Plus Best Countries for 2nd Citizenship)

The Royals With the Most Fake Followers - Including King Charles and Camilla

Big Tech Earnings Are Out This Week. What Investors Are Looking to See

hor-line-light-blue.png

Tech & Trends ›


Data Analytics: How to Use Data to Improve Business Outcomes

The Best Web Design Tools to Create Awesome Websites

What the Future of Metaverse Drivers Will Look Like


How to Build a Data Strategy for Your Business (And Why)

4 Things You Should Know About Ransomware (& How to Avoid It)

Biggest Cyber Threats in Remote Working

Best Mac Cleaners for a Clean and Superfast Mac

7 Simple Tips to Minimize Website Development Costs

5 Best Entertainment Apps for Android and iOS This Year
 

horizontal yellow line

Arts & Culture ›


Best Jewelry Items for Various Types of Celebrations and Events

Is Offset Printing the Future for Indie Authors?

man-suit-relaxing-feet up-ship-deck-laptop-on-deck

10 Reasons Why I Love Writing for the Internet (And Why You Should Too)


How to Use Chat GPT for Writing Excellent Content (Tips & Best Practices)

Are Infographics Effective in the Classroom?

Why Achieving Creative Success Is a Process - Not an Event

5 Things Successful Writers Do That Are Rarely Discussed

8 Brainstorming Strategies for Generating New Writing Ideas

Self-Motivation: 5 Things I Do to Motivate Myself to Keep Writing Every Day

hor-line-brn.png

Business & Economy ›


Three Excellent Ways to Optimize Your Use of Instagram for Business

How to Write a Viral Blog Post: A Quick Guide to Attract Maximum Eyeballs for Your Content

5 Tips On Hiring Blog Writing Services for Small Businesses


5 Ways Teachers Can Improve Their Classroom Management

How to Effect Corporate Training for Up-to-Date Employees On Technology

7 Tips for Finding a Great Staffing Firm

Email Conversion Rates Optimization: How to Really See Improvements

The Impact of the Gambling Industry On US Economy

8 Best Pizza Ordering Systems (And Tips to Choose Your POS System)

Home | About | Contributors | Write for Us | Advertise | Disclosure | Privacy Policy | Contact Us

Follow Us:

twitter_e.jpg linkedin-pg.jpg email-updates_icon.jpg

© 2023 Copyright, The Web Writer Spotlight.

Committed to quality content and journalistic ethics.

RSS rss

Search WWS search-icon-trans_0_1.png

Webwriterspotlight.com. All rights reserved.
x
x