Phishing

Phishing refers to sending emails that appear to come from trusted sources, but in reality aim to manipulate the recipient to steal sensitive information.

How Phishing Works

Most phishing attacks begin with receiving an email or direct message in which the sender impersonates a real company or other organization in order to trick the recipient. This email includes links to a website prepared by the criminals – which imitates that of the legitimate company – and in which the victim is invited to enter their personal data.

In this sense, there is a link between spam and phishing, as fraudulent emails are often sent en masse to multiply the number of potential victims of hackers. E-mail continues to be the most used means by cybercriminals for this type of fraud, phishing can use other means of communication: attempts via SMS (sometimes called smishing), VoIP (vishing) or instant messages on social networks are frequent.

How to recognize a phishing message

  • It is rare for companies to ask for personal data via email.
    • Be cautious when carrying out operations from your smartphone.

How to Protect Yourself Against Phishing

  • After reading the email, don’t click on any links. Carry out the necessary verifications, going directly from the browser’s URL.
    • Keep the computer with the latest updates of the operating system and web browser.
    • Have a professional antivirus
    • Enter your sensitive data only on secure websites.
    • Periodically review your accounts.

Source: https://www.pandasecurity.com/es/security-info/phishing/

At Itera we can help you.
Contact a specialist: seguridad@iteraprocess.com

Ready to take full control of your cloud investment?

Casos de éxito