Phishing Attack – How Can You Prevent Such Attack?

 Phishing Attack – How Can You Prevent Such Attack?

Nowadays, phishing attack has become quite prevalent where a fraudulent electronic communication is made to deceive the receiver for taking certain advantage. By using such method, the attacker can get much confidential and sensitive information like:

  • Passwords
  • Usernames
  • Network credentials
  • Credit card information etc.

The attacker may pose as legitimate institution and may also make phone calls or send an authenticated looking email by which they can easily manipulate their victims. Mostly they may send a link and ask the receiver to click on those links.

These type of cyber security concerns are not just limited within individuals but also an organization can be victim of such attack. Many companies have lost their sensitive data and as a result suffered a heavy financial loss too.

Different types of phishing

There are certain specific kinds of phishing are used for targeting any specific individual or organization. Following are few different types of phishing can be found.

  1. Spear fishing

Here the attacker will collect few information about the victim and then send a specific email based on that. They may also hijack certain business email and their response may look quite authenticated.

  1. Clone phishing

Here the attackers can view your previously delivered emails and make almost identical copy and then change any attachment/link to some malicious thing.

  1. Whaling

In the whaling specifically any high-profile person in the organization is targeted and present as certain legal communication and gathers information.

How you can prevent phishing attacks

It is important to have good awareness and employees of any organization also need to be educated about such threats so that they may not do any blunder that may result into leaking of certain vital information about the company.

Some of email which are likely to be sign of phishing can be as follows:

  • Any attractive offer which looks too good
  • Unusual sender
  • Message may have poor grammar and spelling
  • Email providing a message with certain sense of urgency and ask the receiver to act
  • Links in the email particularly the destination URL can be different from the email content
  • Any unexpected attachments

You may also take the following steps for reducing the risk of getting trapped by phishing attack:

  1. Look very carefully the email headers

Try to check the fields of “From” and “To” and try to see if you find anything suspicious.

  1. Check the link and read the URL completely

While visiting any website link, check whether the website link and the listed URL are the same or not.

Paul diverson