How to ‘Phight Phish”. Helpful Tips to Protect You and Your BusinessHow to ‘Phight Phish”. Helpful Tips to Protect You and Your BusinessHow to ‘Phight Phish”. Helpful Tips to Protect You and Your BusinessHow to ‘Phight Phish”. Helpful Tips to Protect You and Your Business
  • Interface
    • About Us
    • Our Values
    • Team
    • Blog
    • Newsletters
  • Telecom
    • Business Internet Service Provider
    • Business VoIP Service
    • Video Conferencing
    • Teleconferencing
  • IT Support
    • Network Support
    • Remote Desktop Support
    • On-site Desktop Support
    • Mobile Device Management
    • Cisco Support
  • IT Consulting
    • IT Projects
    • Office IT Relocation
    • Hardware Procurement
    • Network Cabling
  • Cloud Service
    • Hosted Cloud Servers
    • Local and Cloud Backup
    • Microsoft Exchange and Mail Services
  • Managed IT Services
    • Server Management
    • Server Colocation
    • Data Security and Protection
  • APP & Web Design
    • Web Design & SEO
    • Custom App Development
  • Cyber Security Practice
  • Satellite Technology
  • Free IT Resources
  • Interface
    • About Us
    • Our Values
    • Team
    • Blog
    • Newsletters
  • Telecom
    • Business Internet Service Provider
    • Business VoIP Service
    • Video Conferencing
    • Teleconferencing
  • IT Support
    • Network Support
    • Remote Desktop Support
    • On-site Desktop Support
    • Mobile Device Management
    • Cisco Support
  • IT Consulting
    • IT Projects
    • Office IT Relocation
    • Hardware Procurement
    • Network Cabling
  • Cloud Service
    • Hosted Cloud Servers
    • Local and Cloud Backup
    • Microsoft Exchange and Mail Services
  • Managed IT Services
    • Server Management
    • Server Colocation
    • Data Security and Protection
  • APP & Web Design
    • Web Design & SEO
    • Custom App Development
  • Cyber Security Practice
  • Satellite Technology
  • Free IT Resources
  • 416-363-9880
Contact UsSubscribeSupport
✕
Business photo created by rawpixel.com - www.freepik.com
A Practical Guide to Dealing with Ransomware
October 26, 2021
Business photo created by rawpixel.com - www.freepik.com
The Dangers of Brand Forgery
October 26, 2021
Published by Interface Technologies at October 26, 2021
Technology vector created by freepik - www.freepik.com

Technology vector created by freepik - www.freepik.com

How to “Phight Phish”. Helpful Tips to Protect You and Your Business

Technology vector created by freepik - www.freepik.com
Technology vector created by freepik - www.freepik.com

At the center of cybersecurity is our favorite topic – email phishing. This week, as part of Cybersecurity Awareness Month, we are all called to ‘Phight Phish”. Of course, it’s not as easy as it might sound. Of the $4.2 billion in losses reported in 2020 by the Internet Crime Complaint Center (IC3), email phishing threats were the #1 source of cybercrime.

One of the reasons why these numbers are so high is because phishing emails come in many forms, including:

  • Account Takeovers
  • Brand Impersonation
  • Business Email Compromise (BEC)
  • CEO Fraud
  • Malware
  • Ransomware
  • Spear Phishing
  • Zero-Day Attacks

Not surprising, the number of instances is continuing to climb as well, steadily rising from 298,728 complaints in 2016 to a whopping 791,790 in 2020.1 It’s not a problem that is just going to go away. Globally, the U.S. leads the world in terms of instances of cybercrime, with the hardest-hit states being California, Florida, Texas, New York, and Illinois.

To help defend yourselves and others in the fight against email phishing, a number of Cybersecurity Awareness Month resources are being shared by the government’s Cybersecurity and Infrastructure Security Agency (CISA). One of these resources is a Phishing Tips Sheet. While these tips alone won’t prevent a successful phishing attack (for that you need a third-party phishing software solution) but they are great best practices. To guard against phishing, CISA’s Phishing Tips Sheet urges us all to do the following:

Play hard to get with strangers. Links in email and online posts are often the way cybercriminals compromise your computer. If you’re unsure who an email is from—even if the details appear accurate—do not respond, and do not click on any links or attachments found in that email. Be cautious of generic greetings such as “Hello Bank Customer,” as these are often signs of phishing attempts. If you are concerned about the legitimacy of an email, call the company directly.

Think before you act. Be wary of communications that implore you to act immediately. Many phishing emails attempt to create a sense of urgency, causing the recipient to fear their account or information is in jeopardy. If you receive a suspicious email that appears to be from someone you know, reach out to that person directly on a separate secure platform. If the email comes from an organization but still looks “phishy,” reach out to them via customer service to verify the communication.

Protect your personal information. If people contacting you have key details from your life—your job title, multiple email addresses, full name, and more that you may have published online somewhere—they can attempt a direct spear-phishing attack on you. Cybercriminals can also use social engineering with these details to try to manipulate you into skipping normal security protocols.

Be wary of hyperlinks. Avoid clicking on hyperlinks in emails and hover over links to verify authenticity. Also, ensure that URLs begin with “https.” The “s” indicates encryption is enabled to protect users’ information.

Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring.

Shake up your password protocol. According to the National Institute of Standards and Technology guidance, you should consider using the longest password or passphrase permissible. Get creative and customize your standard password for different sites, which can prevent cybercriminals from gaining access to these accounts and protect you in the event of a breach. Use password managers to generate and remember different, complex passwords for each of your accounts.

Install and update anti-virus software. Make sure all of your computers, Internet of Things devices, phones, and tablets are equipped with regularly updated antivirus software, firewalls, email filters, and anti-spyware.

Raising awareness about cybersecurity is a noble endeavor. However, it would all be for nought if we didn’t take the next step forward and actually implement the very phish fighting tactics that can keep us phish-free. For businesses, that means investing in the type of technology you need to protect your company from phishing attacks.

Interface Technologies’ Cybersecurity is the industry’s best solution for the security of your email. Cost-effective and powerful, Interface protection can be implemented quickly, regardless of whether your employees work at the office or remotely.

If you’re ready to ”Do Your Part. #BeCyberSmart”, we have an easy suggestion. Take just a few moments, right now, to request and schedule a free Interface Cybersecurity demonstration. It’s the best way to protect your company and the best cyber decision you can make in the phight against phishing.

Ready to get started? Call us at 416-363-9880

Ask Us Anything!
Share
2
Interface Technologies
Interface Technologies

Related posts

A satisfied customer is the best business strategy of all

A satisfied customer is the best business strategy of all

May 20, 2022

We sell customer service, not technology


Read more
Business photo created

Is it time to upgrade to Windows 11?

May 17, 2022

Is it time to upgrade to Windows 11?


Read more
Business photo created by www.freepik.com

Business photo created by www.freepik.com

October 26, 2021

How Zero-Day Attacks Work


Read more
Site Map
Privacy Policy
Contact Us
Get it on Google Play Download on the App Store

IT Support

  • Business VoIP Service
  • Business Internet Service Provider
  • Server Management
  • Teleconferencing
  • Local and Cloud Backup

Managed IT Services

  • On-site Desktop Support
  • Remote Desktop Support
  • Mobile Device Management
  • Network Support
© 2018 Managed IT & Outsourcing Services - Interface.ca. All Rights Reserved.
Website Optimized based on Google, Yahoo and Bing Standards. Managed IT Services Cloud Service, IT Support, & IT Outsourcing in the Toronto, Mississauga, Markham, Richmond Hill, Vaughan, & Surrounding Areas


Subscribe
Support


Subscribe