Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Let’s Take a Look at Phishing Attacks

Let’s Take a Look at Phishing Attacks

Phishing attacks are growing in number and it presents a major challenge for businesses. The many different forms that these attacks come in just exacerbates the problem. Today, we will take a brief look at phishing to help you educate your staff on what they entail and how to mitigate the massive risk that comes with them. 

Phishing Attacks

A phishing attack comes in as communication from a trustworthy source as to fool the recipient to interact with it. This could be in the form of an email, a text message, a phone call, or really any other form of direct communication. The goal is to manipulate the recipient into providing access credentials to network-attached resources so they can steal data or deploy malware. 

Since phishing can come in several different forms, it is an effective way to breach your network defenses because the scammers are given access, they don’t have to try and outright breach your network defenses, which in many cases are extremely hard to hack into. Let’s take a look at some of the ways these scams are disseminated.

Business Email Compromise

In a business email compromise scam, the scammer will send an employee an email that, at first glance, comes from an authority figure inside of the business. The messages will be quite vague, but direct the recipient into taking some type of action that will allow the hacker to gain access to resources. Many employees will not think twice when their manager tells them to complete a task, so phishing attacks of this type are successful because people don’t take the time to ascertain that the message isn’t actually from anyone. 

Hackers use this method because they work. In Q2 of 2020, successful business email compromise scams averaged $80,193. 

Clone Phishing

One of the most successful phishing scams is using a clone of a message a recipient would have seen before. By gaining access to data beforehand, the hacker can customize a message that looks like one they have received previously. Typically, this type of familiarity removes any suspicion that the message is actually from a scammer. The links are altered to reroute to a site where scammers collect more information. Pretty crafty way to steal credentials. 

Smishing

Email may be the predominant way that phishing is pushed to people, but it isn’t the only way. Smishing attacks are carried out through text messaging. Most people are much less careful about opening and interacting with text messages than they are with their email, and as a result scammers have started pushing phishing messages that look like legitimate messages through SMS. If you also consider that mobile devices often don’t uphold the same security standards that PCs do, users are more vulnerable through an SMS attack. 

Spear Phishing

The spear phishing attack is probably the most dangerous of the phishing scams. First of all it is deliberately designed for a single user. The hacker, in this case, has already done their due diligence and chose their target based on information they already have about the target. Since these attacks take more time to properly execute, spear phishing is typically carried out against high-value targets. The success rate of these attacks are significantly higher than your average, run-of-the-mill phishing attack

Vishing

Another take on phishing, vishing is just phishing over the phone. A scammer will call a target under the guise of a salesperson or finance professional, and because of their perceived legitimacy, the scammer can typically extract information that will help them gain access to computing resources, or at the very least the target's personal or financial information.  

Whaling

Whaling is a phishing attack, typically a spear phishing attack, aimed at business owners, decision makers, and executives at businesses. These attacks, because they are aimed at people who have access to everything, often are well planned; and, if successful often result in the biggest bounty for the perpetrator.

Phishing is a Serious Threat

You need to have a strategy in place to combat phishing as it is not going anywhere, anytime soon. If you would like to talk to one of our consultants about developing a plan to train your people about phishing attacks and what to do if they come across one, give us a call at 800.618.9844 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud User Tips Network Security Internet Hardware Efficiency IT Support Malware Privacy Google Email Workplace Tips Phishing Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Microsoft Cybersecurity Small Business Passwords Communication Data Backup Smartphone Backup Saving Money Android Business Management VoIP Smartphones communications Upgrade Managed Service Mobile Devices Disaster Recovery Data Recovery Browser Managed IT Services Social Media Microsoft Office Windows Remote Network Tech Term Internet of Things Current Events Artificial Intelligence Facebook Automation Productivity Cloud Computing Covid-19 Gadgets Server Managed Service Provider AI Remote Work Miscellaneous Information Holiday Outsourced IT Employee/Employer Relationship Encryption Spam Compliance Office Windows 10 Government Data Management Training Business Continuity Wi-Fi Blockchain Windows 10 Bandwidth Virtualization Business Technology Data Security Two-factor Authentication Mobile Office Apps Networking Mobile Device Management BYOD Vendor Chrome Gmail Budget Apple App Employer-Employee Relationship Managed Services Voice over Internet Protocol Computing Hacker How To Information Technology Avoiding Downtime BDR Marketing Office 365 IT Support Applications Access Control WiFi Tip of the week Conferencing Computers Managed IT Services Risk Management Website Analytics Office Tips HIPAA Router Augmented Reality Virtual Private Network Storage Password Bring Your Own Device Health Help Desk Big Data Retail Healthcare Operating System Excel Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Firewall Physical Security Display Printer Paperless Office The Internet of Things Infrastructure Monitoring Social Document Management Going Green Remote Workers Windows 11 Telephone Customer Service Scam 2FA Data loss Cybercrime YouTube Presentation Entertainment Vulnerabilities Cryptocurrency Wireless Technology Images 101 Telephone System Virtual Desktop Multi-Factor Authentication Robot Mobility Data storage LiFi Cost Management Word Outlook IT Management VPN Employees Meetings Data Privacy Money Humor Integration User Tip Modem Safety Processor Computer Repair Mobile Security Sports Holidays Mouse Data Storage Administration Smart Technology Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Customer Relationship Management Managed IT Service Maintenance Settings Wireless Downloads Printing Antivirus Content Filtering iPhone Supply Chain Hacking Licensing Cyber security Outsourcing Multi-Factor Security Tech Social Network Telework Google Drive CES User Tablet IoT Communitications Knowledge Dark Web Workplace Trends Supply Chain Management Alert File Sharing Regulations 5G Hiring/Firing Dark Data Google Calendar Term Managed IT Customer Resource management FinTech IP Address Google Docs Data Analysis Unified Communications Star Wars IT Assessment Experience How To Microsoft Excel Paperless Co-managed IT Bitcoin Gamification Flexibility Running Cable Notifications Staff Value Organization Travel Social Networking Technology Care Legislation Google Wallet Techology Fileless Malware Digital Security Cameras Recovery Google Maps Smart Devices Business Communications Wearable Technology Memory Scams Hard Drives Windows 8 Content Remote Working Laptop Health IT Unified Threat Management Motherboard Data Breach Hybrid Work Comparison Google Play Domains Drones Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Human Resources Wasting Time Cables Refrigeration Halloween Trend Micro Network Congestion Specifications Security Cameras Public Speaking Lithium-ion battery User Error Microchip Internet Exlporer Software as a Service Fraud Google Apps Managing Costs IT Maintenance Hacks Username Entrepreneur Scary Stories Point of Sale eCommerce Fun Business Intelligence Black Friday SSID Deep Learning Database Surveillance Virtual Assistant Shortcuts Tech Support IT Technicians Virtual Machine Ransmoware Undo Network Management Proxy Server Reviews Education Cookies Vendors Monitors Cyber Monday Medical IT Tactics Development Hotspot Transportation Be Proactive Websites Mirgation Hypervisor Workforce Mobile Computing Shopping Nanotechnology Optimization Search Threats PowerPoint SharePoint Application Best Practice Addiction Electronic Medical Records Language Employer/Employee Relationships Workplace Strategies Buisness Chatbots Meta Navigation Management PCI DSS IBM Legal Lenovo Gig Economy IT solutions Screen Reader Amazon Writing Distributed Denial of Service Business Growth Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Private Cloud Identity Outsource IT Evernote Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Cortana Environment Media Alt Codes Download Net Neutrality Twitter Alerts SQL Server Downtime Error History Small Businesses Competition Financial Data Browsers Smartwatch Hosted Solution Connectivity IT Displays Social Engineering Break Fix Typing Upload Procurement Remote Computing Azure

Blog Archive