Jump to content

Avoid Phishing Attacks: Difference between revisions

no edit summary
No edit summary
(5 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{{abox
{{abox
  | name          = How do I avoid phishing attacks?
  | name          = How do I avoid phishing attacks?
  | summary      = A screencast is a digital recording of computer screen output, also known as a video screen capture, often containing audio narration.
  | summary      = How To Recognize and Avoid Phishing Scams.
  | for_employees = Y
  | for_employees = Y
  | for_students  = Y
  | for_students  = Y
  | for_parents  =  
  | for_parents  =  
  | cat1          =  Classroom technology and systems
  | cat1          =  Classroom Technology and Systems
  | cat2          =
  | cat2          =
  | maintained    = MR
  | maintained    = MR
  | year          = 2019-2020
  | year          = 2022-2023
}}
}}
== What is "Phishing"? ==
== What is "Phishing"? ==
Line 36: Line 36:
Spear phishing is an email or electronic communications scam targeted towards a specific individual, school or business. Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user’s computer.
Spear phishing is an email or electronic communications scam targeted towards a specific individual, school or business. Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user’s computer.
== How does "Spear Phishing" work? ==
== How does "Spear Phishing" work? ==
An email arrives, apparently from a trustworthy source, but instead it leads the unknowing recipient to a bogus website full of malware. These emails often use clever tactics to get victims' attention.  
An email arrives, apparently from a trustworthy source, but instead it leads the unknowing recipient to a bogus website full of malware. These emails often use clever tactics to get victims' attention.
One employee mistake can have serious consequences. With stolen data, fraudsters can reveal sensitive information. In addition, spear phishing attacks can deploy malware to hijack computers, organizing them into enormous networks called botnets that can be used for denial of service attacks.
 
== How to protect yourself from spear phishing ==
== How to protect yourself from spear phishing ==
Traditional security often doesn't stop these attacks because they are so cleverly customized. As a result, they're becoming more difficult to detect. One employee mistake can have serious consequences. With stolen data, fraudsters can reveal sensitive information. In addition, spear phishing attacks can deploy malware to hijack computers, organizing them into enormous networks called botnets that can be used for denial of service attacks.
To fight spear phishing scams, employees need to be aware of the possibility of bogus emails landing in their inbox.
To fight spear phishing scams, employees need to be aware of the possibility of bogus emails landing in their inbox.
2,227

edits