SlideShare a Scribd company logo
1 of 8
Seven steps to avoid being 'phished'

An international hacker was recently found to have more than 10,000
stolen debit and credit card numbers. So, clearly, phishing – the practice
of tricking someone into giving bank or credit card information – is rife
and plenty of people are falling for it.

Many businesses issue staff with credit cards to pay for work expenses.
But don‟t assume everyone who works in your small business is too smart
to be taken in by the corrupt come-on of some creep who slips past your
email filters. Phishing messages can be slyly convincing.

The website that a phisher‟s email links to will have an address (URL) that
is similar to but not the same as a real bank's or financial institution‟s
site. For instance, if the real site is at 'www.yourbank.com.au', the
scammer may use an address like 'www.yourbank.com.au.log107.biz'.
The fake site may be stamped with logos indistinguishable from those on
the real site.

Here are seven tips to help counter the slippery threat of phishing with
protection, detection and correction.
1. Use anti-phishing staff training programs

  One way to prevent the potential financial harm that can be inflicted
  by phishing attacks is to train your staff to understand phishers‟
  manipulative „head hacking‟ antics. Software training programs
  include PhishGuru and PhishMe, which is a phishing simulator that
  boosts awareness of the sophisticated tactics used by hackers
  looking to compromise your firm‟s data and systems.


 2. Take a cross-platform stance


  You need to raise your game as criminals grow smarter, says the
  cyber safety expert for the security firm Trend Micro, Aman Chand.
  Attend to all the internet-connected gadgets your business has
  because you need multi-device protection, Chand says. Besides
  Trend Micro, McAfee, Symantec and Webroot can offer protection
  for all your devices.
3. Remember your mobile

Ensure your staff do not leave mobiles unguarded, Chand says. Just
locking up a mobile with a password will no longer do. Mobile devices
need proper security software, which is available from all the big
antivirus firms, from Trend Micro to Avast!, McAfee and Norton.
Mobile is the new frontier for cybercriminals, according to Chand. In
2012, Trend Micro research showed cybercriminals were increasingly
targeting mobiles with phishing attacks. Chand highlights the plight
of the popular mobile platform Android. During its first three years
Android has faced the same number of global threats it took the
personal computer platform 14 years to rack up.
4. Shun that attachment

 Three quarters of all spam attachments are malicious, according to
 Trend Micro research. Make sure your staff understand that if they
 have doubts about an attachment they should not open it, because it
 could be the gateway to your system a hacker seeks. Carelessly click
 an attachment and if you are unlucky the business may be deluged
 with spam. Worst case: your computers could become an open book
 to a shyster intent on stealing your business‟s information.
5. Run scanners


  According to a security advisor for AVG Technologies AU, Michael
  McKinnon, while old-school phishing attacks take credentials
  under false pretences, others just infect your computers by
  exploiting any detected vulnerabilities – lapses like out-of-date
  or non-existent anti-hacker software.

  Prevent infection, McKinnon advises, by running an anti-virus
  scanner on all your computers. Vitally, it will ensure that any
  known malware is detected before a rogue program executes and
  takes hold of the computer.

  Another tool, link-scanning software, gauges web pages‟ content
  before they are opened, checking if they have been compromised.
  If so, the software blocks the shady pages, which may carry code
  designed to exploit the machine.
6. Build an arsenal


    Be thorough – combine multiple layers of anti-virus and anti-
    spam technologies that are always turned on and updating
    automatically. Your business‟s defensive arsenal should include a
    firewall, anti-virus detection and anti-spam capabilities. Besides
    AVG, popular and powerful defence brands include Avira,
    Kaspersky, Ad-Aware and Spybot.

    Together, your defences will shield your business from harm by
    addressing different and sometimes overlapping areas of concern.

    Consider upgrading your hardware if your business has clunky
    computers that cannot run all the safety mechanisms. McKinnon
    says: “Don‟t forsake your own security just so you can squeeze the
    last drops from your old computer.”
7. Change your passwords



 Change login details as soon as a phishing attack occurs. Make sure
 all staff use complicated passwords. Passwords should be strong,
 long and secure. Have a policy so that staff use a mix of uppercase
 and lowercase letters, symbols and numbers.

 If you follow these steps, you should reduce the risk of your
 business being phished or minimise any damage.

 The effort has to be worth it because phishing is a nasty, devious
 crime. Besides draining your business of valuable cash, it will leave
 you feeling foolish and violated. If you relax and just hope it
 doesn‟t happen to you, it may well be just a matter of time before
 someone in your company is suckered.

More Related Content

Viewers also liked (15)

โรงเรียนปงสนุก
โรงเรียนปงสนุกโรงเรียนปงสนุก
โรงเรียนปงสนุก
 
Miche Spring 2015 Catalog
Miche Spring 2015 CatalogMiche Spring 2015 Catalog
Miche Spring 2015 Catalog
 
Presentasi SQFSYSTEM
Presentasi SQFSYSTEMPresentasi SQFSYSTEM
Presentasi SQFSYSTEM
 
Where is The Love - Juan Sebastian Grisales
Where is The Love - Juan Sebastian GrisalesWhere is The Love - Juan Sebastian Grisales
Where is The Love - Juan Sebastian Grisales
 
Athena_BaoCao_Huynh_Chanh_Thong_MailServer
Athena_BaoCao_Huynh_Chanh_Thong_MailServerAthena_BaoCao_Huynh_Chanh_Thong_MailServer
Athena_BaoCao_Huynh_Chanh_Thong_MailServer
 
40piecesofadvice
40piecesofadvice40piecesofadvice
40piecesofadvice
 
Denim us ppt
Denim us pptDenim us ppt
Denim us ppt
 
Business lessons
Business  lessonsBusiness  lessons
Business lessons
 
Beautiful life
Beautiful lifeBeautiful life
Beautiful life
 
Motivation and it is in action
Motivation and it is in actionMotivation and it is in action
Motivation and it is in action
 
Epi info grupo 4
Epi info grupo 4Epi info grupo 4
Epi info grupo 4
 
Clubul matematcienilor v 1 p04
Clubul matematcienilor v 1 p04Clubul matematcienilor v 1 p04
Clubul matematcienilor v 1 p04
 
Reach Escape Velocity through Lean Content Marketing - Guillaume Decugis
Reach Escape Velocity through Lean Content Marketing - Guillaume DecugisReach Escape Velocity through Lean Content Marketing - Guillaume Decugis
Reach Escape Velocity through Lean Content Marketing - Guillaume Decugis
 
2015 Jewelry in Candles Catalog
2015 Jewelry in Candles Catalog2015 Jewelry in Candles Catalog
2015 Jewelry in Candles Catalog
 
Musicpool
MusicpoolMusicpool
Musicpool
 

Recently uploaded

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Seven steps to avoid being 'phished'

  • 1.
  • 2. Seven steps to avoid being 'phished' An international hacker was recently found to have more than 10,000 stolen debit and credit card numbers. So, clearly, phishing – the practice of tricking someone into giving bank or credit card information – is rife and plenty of people are falling for it. Many businesses issue staff with credit cards to pay for work expenses. But don‟t assume everyone who works in your small business is too smart to be taken in by the corrupt come-on of some creep who slips past your email filters. Phishing messages can be slyly convincing. The website that a phisher‟s email links to will have an address (URL) that is similar to but not the same as a real bank's or financial institution‟s site. For instance, if the real site is at 'www.yourbank.com.au', the scammer may use an address like 'www.yourbank.com.au.log107.biz'. The fake site may be stamped with logos indistinguishable from those on the real site. Here are seven tips to help counter the slippery threat of phishing with protection, detection and correction.
  • 3. 1. Use anti-phishing staff training programs One way to prevent the potential financial harm that can be inflicted by phishing attacks is to train your staff to understand phishers‟ manipulative „head hacking‟ antics. Software training programs include PhishGuru and PhishMe, which is a phishing simulator that boosts awareness of the sophisticated tactics used by hackers looking to compromise your firm‟s data and systems. 2. Take a cross-platform stance You need to raise your game as criminals grow smarter, says the cyber safety expert for the security firm Trend Micro, Aman Chand. Attend to all the internet-connected gadgets your business has because you need multi-device protection, Chand says. Besides Trend Micro, McAfee, Symantec and Webroot can offer protection for all your devices.
  • 4. 3. Remember your mobile Ensure your staff do not leave mobiles unguarded, Chand says. Just locking up a mobile with a password will no longer do. Mobile devices need proper security software, which is available from all the big antivirus firms, from Trend Micro to Avast!, McAfee and Norton. Mobile is the new frontier for cybercriminals, according to Chand. In 2012, Trend Micro research showed cybercriminals were increasingly targeting mobiles with phishing attacks. Chand highlights the plight of the popular mobile platform Android. During its first three years Android has faced the same number of global threats it took the personal computer platform 14 years to rack up.
  • 5. 4. Shun that attachment Three quarters of all spam attachments are malicious, according to Trend Micro research. Make sure your staff understand that if they have doubts about an attachment they should not open it, because it could be the gateway to your system a hacker seeks. Carelessly click an attachment and if you are unlucky the business may be deluged with spam. Worst case: your computers could become an open book to a shyster intent on stealing your business‟s information.
  • 6. 5. Run scanners According to a security advisor for AVG Technologies AU, Michael McKinnon, while old-school phishing attacks take credentials under false pretences, others just infect your computers by exploiting any detected vulnerabilities – lapses like out-of-date or non-existent anti-hacker software. Prevent infection, McKinnon advises, by running an anti-virus scanner on all your computers. Vitally, it will ensure that any known malware is detected before a rogue program executes and takes hold of the computer. Another tool, link-scanning software, gauges web pages‟ content before they are opened, checking if they have been compromised. If so, the software blocks the shady pages, which may carry code designed to exploit the machine.
  • 7. 6. Build an arsenal Be thorough – combine multiple layers of anti-virus and anti- spam technologies that are always turned on and updating automatically. Your business‟s defensive arsenal should include a firewall, anti-virus detection and anti-spam capabilities. Besides AVG, popular and powerful defence brands include Avira, Kaspersky, Ad-Aware and Spybot. Together, your defences will shield your business from harm by addressing different and sometimes overlapping areas of concern. Consider upgrading your hardware if your business has clunky computers that cannot run all the safety mechanisms. McKinnon says: “Don‟t forsake your own security just so you can squeeze the last drops from your old computer.”
  • 8. 7. Change your passwords Change login details as soon as a phishing attack occurs. Make sure all staff use complicated passwords. Passwords should be strong, long and secure. Have a policy so that staff use a mix of uppercase and lowercase letters, symbols and numbers. If you follow these steps, you should reduce the risk of your business being phished or minimise any damage. The effort has to be worth it because phishing is a nasty, devious crime. Besides draining your business of valuable cash, it will leave you feeling foolish and violated. If you relax and just hope it doesn‟t happen to you, it may well be just a matter of time before someone in your company is suckered.