I’ve Gone Phishing

[vc_row][vc_column width=”1/1″][vc_column_text]

how to prevent data phishing imageI’m gonna go down to that ole phishing hole to see what phish I can catch.

Bonnie & Clyde have moved into the modern era to attack our businesses to steal our identity, money, confidential data, corporate trade secrets, or military information. Vandals also affront attacks just to see what damage they can cause our computer systems.

One of the main vehicles for these crimes is by electronically masquerading as a trustworthy entity or person. The tricks used are really quite ingenious to try to get you to open those cute pictures attached or to try to get you to go to this website to see the most hilarious video. Many of these criminals also prey on our fears and scare us into opening that attachment or going to that website or we will face some dire consequence.

These attempts are called phishing. If they target a specific organization it is called spear phishing.

It is a crime.

Learn how to protect yourself and your company.

Be smart.

Before you open that attachment with those cute pictures or hurriedly click on that hyperlink so you can complete that form in time before being fined…


Check the email address…do you recognize it…please look closely. Deep Panda’s recent attack reportedly was from We11point masquerading as Wellpoint.

If in doubt, call the person or company from the telephone number you know outside of the email. The telephone number in the email could be bogus.
Check the hidden URL of the hyperlink…by hovering your mouse over the hyperlink that you will be redirected to…do you recognize it…please look closely, are words in the right order

If in doubt, bring up the known website directly NOT from the hyperlink…what do you see, does it correspond to the email or do you see a spam alert? Can you get to the information contained in the email directly from the official website?

Questions to ask yourself:

  • Is it an email address you recognize?
  • Is the information attached something this person would send to you?
  • Is the extension of the attachment .zip; .su; .exe or a country code such as .uk; .au (United Kingdom, Australia)? Check with sender before opening.
  • Do I recognize the URL attached to the hyperlink?

Think about it, do you blindly open your front door to strangers?

Post Written By Deborah H. Conklin, Corporate Compliance Officer, Ameridial Inc.[/vc_column_text][/vc_column][/vc_row]