Cyber Attacks and Phishing: Compromising User Security

Phishing

|

BY Konstantine Zuckerman

As technology connects the world more and more, we find our important information at greater and greater risk of compromise through cyber attacks. However, as complicated as the techniques used by hackers have gotten in the decades since the creation of the Internet, the most common security risk is nearly as old as the Internet itself.

Phishing is a strategy whereby a hacker will contact someone via email, pretending to represent an important person or organization, such as a bank, an admin from a social media website, or someone claiming to have money from a lottery.

This acts as a point of trust, whereby the victim of the phishing attack with voluntarily give up sensitive information, such as usernames, passwords, Social Security Numbers, credit card info, etc..

These sorts of scams are commonplace and continue to source millions of dollars in profit for hackers and other cybercriminals. Phishing scams take advantage of human psychology, and so while many people are susceptible to such attacks, there are many precautions one can take to avoid falling victim oneself.

The most tried and true defense from phishing techniques comes from employee education. Since new phishing techniques are being developed constantly, businesses and organizations need to keep their employees up to date on how to spot common phishing attempts. IT departments at companies should run periodic phishing drills and employee training to keep their coworkers up to date on the dangers.

Most of the time, phishers will attempt to collect important company information by having them click on a link, or log into a scam website to collect usernames, passwords, keys, etc.. While everything may seem legitimate at first, there are many telltale signs to distinguish a phishing email from an official email.

For example, phishing emails will not be specific; rather than naming the recipient will say something vague such as “Dear customer” in the tagline.

Furthermore, upon closer inspection, many phishing emails contain misspellings and other inconsistencies. It is important for businesses and their employees to think before they click and to never give out sensitive information to an unverified source.

When in doubt, one should verify with the source where the email claims to be from, to verify if this information is being requested. Furthermore, many companies, banks, etc. which deal with sensitive information, make it a point that they will never email to ask for this information through email.

Many browsers nowadays have plugins and software which will inform users if a website, download,  or link is safe or not to interact with. Make sure any company computers have such software installed and kept up to date. This software comes with most popular browsers for free.

When accessing a website, it is natural to be wary of sharing any sensitive (esp. financial) information. However, if one can verify the security of a website this shouldn’t be a problem. Businesses and employees should make sure the connection to a website is secure by checking the URL. The URL should begin with https:://, referring to a secure hypertext transfer protocol. If this is not present, it is most safe not to share sensitive information along this connection, as it could be a link to a compromised or malicious website.

It is very important for an organization to have security measures up to date on the backend. Investing in a quality firewall is key here. The firewall effectively creates a closed network of computers, protecting computers within the company’s firewall from outside interference. There are two types of firewall; a desktop or software firewall, and a server or hardware firewall. When used in tandem they can act as a great protection of sensitive information and company networks from hackers and other cybercriminals.

That being said, an extra layer of protection can be enacted on the software side. In addition to firewalls, companies should invest in high quality anti-virus software. Antivirus software lists common technological loopholes and weakpoints, and prevents malware from exploiting these. It is of great importance that this antivirus software be kept up to date. As mentioned before, all sorts of new hacking techniques are being developed all the time, so keeping technology up to date will protect users from most known forms of attack.

Lastly, beware of pop ups. Oftentimes, pops appear pretending to be from legitimate companies and organizations, while truly waiting for someone who’s inattentive to click on the link, exposing their computer and their network to all sorts of malware. Most browsers come with popup blockers, and the software is easy to install and keep up to date.

To recap, while phishing poses a great financial and security risk to many companies, small and large, there are many steps individuals and organizations can take to avoid the full brunt and cost of these attacks:

Employees should be kept up to date on the sorts of common phishing practices, and IT departments should test this knowledge through regular phishing drills and training.

Many software solutions exist to combat the problem, including firewalls, popup and ad blockers, and browser extensions.

Employees and businesses must stay vigilant and be on the lookout for any sort of suspicious communication, and report it to their IT departments to allow the collective knowledge of cyberattack methods to grow and expand.

There is no one way of preventing and avoiding phishing attacks. However, with the right mindset and preparation they are avoidable, and millions of dollars and company reputation can be saved and preserved. With these aforementioned precautions, you will find your exposure to cyberattacks greatly reduced, and trust that your sensitive information will be much more secure. There is no need to constantly worry about these sorts of attacks if you make sure your organization is prepared through the right mixture of human intelligence and software protection.

Stay safe, and stay diligent.

Discuss your project now

Related Content

Previous
Next

Schedule a personalized demo with CYBRI.

Don't wait, reputation damages & data breaches could be costly.

Tell us a little about your company so we can ensure your demo is as relevant as possible. We’ll take the scheduling from there!
Michael B.
Michael B.Managing Partner, Barasch & McGarry
Read More
I am an attorney who represents thousands of people in the 9/11 community. CYBRI helped my company resolve several cybersecurity issues. I definitely recommend working with CYBRI.
Tim O.
Tim O.CEO at Cylera
Read More
I’m using CYBRI and have been very impressed with the experience and quality of the experts and CYBRI’s customer service. It has been a super seamless process that I’m happy and pleased with – I recommend CYBRI to all businesses.
Sergio V.
Sergio V.CTO at HealthCare.com
Read More
I hired CYBRI to help my company with various cybersecurity services, specifically HIPAA and CCPA. I have been satisfied with the quality of work performed by the cybersecurity expert. The customer service is excellent. I would recommend CYBRI for all of your cybersecurity needs.
L.D. Salmanson
L.D. SalmansonCEO at Cherre.com
Read More
We worked with CYBRI on assessing vulnerabilities and understanding the risks of our client-facing web assets. We are satisfied with the results and the professionalism of the Red Team members. Highly recommend CYBRI to all businesses.
Marco Huslmann
Marco HuslmannCTO MyPostcard
Read More
CYBRI is a great solution that helps streamline the penetration testing process. I strongly recommend them and will work with them again.
Alex Rothberg
Alex RothbergCTO IntusCare
Read More
I highly recommend CBYRI to businesses that need penetration testing to ensure their business infrastructure is secure.
John Tambuting
John TambutingCTO Pangea.app
Read More
I am confident CYBRI is the right penetration testing choice if you are looking to build a secure business environment.
Previous
Next

Discuss your Project







    Michael B.
    Michael B.Managing Partner, Barasch & McGarry
    Read More
    I am an attorney who represents thousands of people in the 9/11 community. CYBRI helped my company resolve several cybersecurity issues. I definitely recommend working with CYBRI.
    Tim O.
    Tim O.CEO at Cylera
    Read More
    I’m using CYBRI and have been very impressed with the experience and quality of the experts and CYBRI’s customer service. It has been a super seamless process that I’m happy and pleased with – I recommend CYBRI to all businesses.
    Sergio V.
    Sergio V.CTO at HealthCare.com
    Read More
    I hired CYBRI to help my company with various cybersecurity services, specifically HIPAA and CCPA. I have been satisfied with the quality of work performed by the cybersecurity expert. The customer service is excellent. I would recommend CYBRI for all of your cybersecurity needs.
    L.D. Salmanson
    L.D. SalmansonCEO at Cherre.com
    Read More
    We worked with CYBRI on assessing vulnerabilities and understanding the risks of our client-facing web assets. We are satisfied with the results and the professionalism of the Red Team members. Highly recommend CYBRI to all businesses.
    Marco Huslmann
    Marco HuslmannCTO MyPostcard
    Read More
    CYBRI is a great solution that helps streamline the penetration testing process. I strongly recommend them and will work with them again.
    Alex Rothberg
    Alex RothbergCTO IntusCare
    Read More
    I highly recommend CBYRI to businesses that need penetration testing to ensure their business infrastructure is secure.
    John Tambuting
    John TambutingCTO Pangea.app
    Read More
    I am confident CYBRI is the right penetration testing choice if you are looking to build a secure business environment.
    Previous
    Next

    Find mission-critical vulnerabilities before hackers do.

    CYBRI’s manual pen tests are performed by U.S.-based highly certified Red Team experts.

    We help businesses detect & remediate catastrophic vulnerabilities in applications, cloud, and networks.