K2E Canada Inc
  • Home
  • TRAINING
    • WEBINARS
    • UPCOMING EVENTS
    • ROAD TO EXCELLENCE ONLINE SEMINAR
    • SEMINARS
    • CONFERENCES
    • INSTRUCTORS >
      • ALAN SALMON
  • NEWSLETTER
    • Signup
  • ABOUT
  • CONTACT
  • BLOG
  • Home
  • TRAINING
    • WEBINARS
    • UPCOMING EVENTS
    • ROAD TO EXCELLENCE ONLINE SEMINAR
    • SEMINARS
    • CONFERENCES
    • INSTRUCTORS >
      • ALAN SALMON
  • NEWSLETTER
    • Signup
  • ABOUT
  • CONTACT
  • BLOG

How To Protect Yourself Against A Phishing Attack

2/4/2020

0 Comments

 
How do you protect yourself against phishing attacks? You have probably heard about phishing in the context of the Internet. But in fact, phishing is older than the web itself. This password-stealing technique was first used over the phone. Hence the name that’s a portmanteau of “phone” and “fishing”, as in fishing for passwords or other information.

Today, phishing attacks are still going strong, although now in digital form. Read to find out what a phishing attack is and how to protect your accounts from this common cyber threat.

How Does Phishing Work?

Phishing is a game of deception. A phishing attack involves hackers sending emails posing as a legitimate institutions. The purpose is to trick victims into revealing  sensitive information, such as passwords or credit card details.

Phishing emails use manipulation to compel victims to reveal their information. They often convey a sense of urgency, informing the target that they’re in an overdraft or that their credit card has been blocked. Alternatively, phishing emails would describe too-good-to-be-true scenarios, such as winning a contest the victim never entered or getting an unusually high tax refund.

Typically, phishing emails contain a link that will redirect the victim to a website. These websites attempt to replicate the sites the hackers are impersonating. The unsuspecting target will be prompted to enter their login details or card details as usual. Unfortunately, this information will then go straight to the hackers who can now take over accounts or perform banking operations in the victim’s name.

In an alternative version of phishing, the link won’t take the victim to a site. Instead, it will download malware onto their computer instead. That malicious software will then provide a backdoor to cyber criminals to take control over the device or steal sensitive information.

How to Protect Yourself and Your Data

Know How to Spot a Phishing Attack

The first step to protecting yourself from a phishing attack is to be aware of their existence and treat all incoming emails with a healthy dose of skepticism. Beware of emails that ask you to reveal your personal data and never click any links in suspicious emails.

If you get an email from your bank, the government, or PayPal asking you to log into your account, don’t follow the links in that email. Instead, search the relevant website in your search engine and log in that way. If you want to be extra sure, it’s a good idea to bookmark your bank’s and other important institution’s websites for future reference.

Look also for warning signs in the email. Does it look different than normal? Is the greeting generic and doesn’t include your name? Is the email address correct? Phishing emails are often sent from email addresses that are very similar to the actual ones but so can be easily mistaken at first glance.

Set up Two-factor or Multi-factor Authentication (MFA)

No matter how careful you are, you might still fall victim to a phishing attack. Cybercriminals who run these schemes are experienced and employ increasingly advanced techniques.

The only action that can truly protect you from the consequences of a phishing attack is securing your accounts with two-factor or multi-factor authentication. Two-factor authentication adds another layer of security on top of a password. It combines something you know (password) with something you have (security key, your phone). This means that the hacker can’t simply log in from a new device just by knowing your password. They will still need to complete the second authentication step, which in most cases will be impossible.

There are various methods of authentication that can be used as the second verification step. It’s worth noting that using an authentication app on your phone or a hardware security key are preferred forms of verification. Hackers have been known to redirect text messages of the victim to a different SIM card, so using texts as verification is generally discouraged by security experts.

Conclusion

Phishing attacks can outsmart even extra careful Internet users. It’s important to know how to recognize, what to do when you become a target, and how to prepare a safety net in case you fall for one. In 2019, taking care of one’s cybersecurity is more difficult and more important than ever. You can learn more here in an article on security essentials.

Randy Johnston

0 Comments



Leave a Reply.

    Categories

    All
    Adobe
    Advisory
    AI
    Artificial Intelligence
    Automation
    Business Intelligence
    Cloud Computing
    Collaborate
    Collaboration
    COVID 19
    COVID-19
    CPA
    Cybersecurity
    Ecommerce
    Excel
    Google
    Grammarly
    Internal Priorities
    KPIs
    LET
    Microsoft 365
    Microsoft Teams
    Office
    Office 365
    Online Shop
    Outsourcing
    PivotTables
    Power BI
    PowerPoint
    Productivity
    Ransomware
    Security
    Small Business Accounting Software
    Technology
    Tech Update
    Windows
    Windows 10
    Word
    Work At Home

    Authors


    Ward Blatch
    Ward provides consulting and training services as the Managing Director of K2E Canada Inc. He joined K2E Canada in 2005 and is responsible for the Canadian operations of this international consulting group, which provides professional development technology education for accountants across Canada and the US. Ward lives in rural Nova Scotia and can be reached at ward@k2e.ca.

    Alan Salmon
    Alan Salmon is recognized as Canada’s leading analyst in the area of accounting technology. He has nearly 35 years of business, management systems, education and journalism experience, has a degree in Science and an Advanced Teaching Certificate from the University of Toronto. Alan has now retired from teaching and lives in Brampton, Ontario with his wife Nancy. He can be reached at alan@k2e.ca

    Tommy Stephens
    Tommy is one of the shareholders in K2 Enterprises, affiliating with the Firm in 2003 and joining as a shareholder in 2017. At K2, Tommy focuses on creating and delivering content and is responsible for many of the Firm's management and marketing functions. Tommy resides in the metro Atlanta area. You may reach him at tommy@k2e.com.

    Randy Johnson
    Randy is a nationally recognized educator, consultant, and writer with over 40 years experience in Strategic Technology Planning, Accounting Software Selection, Paperless, Systems and Network Integration, Business Continuity and Disaster Recovery Planning, Business Development and Management, Process Engineering and outsourced managed services. Randy can be reached at randy@k2e.com

    RSS Feed

Training & Education

Webinars
Upcoming Events
Road to Excellence Online Seminar
Seminars
Conferences
Instructors

Tech News

K2E Canada's Tech Update Newsletter

More

Privacy Policy
About
Contact

K2E Canada Inc.  |  591 Highway 221  |  North Kingston, NS Canada B0P 1R0  |  (902) 200-9207
© 2020 K2E Canada Inc. ALL RIGHTS RESERVED.