*** Blog post topic ideas ***

  • Information predators
  • Malware distribution
  • Phishing – are you at risk?
  • Who is a target?
  • Who wants your information?

Is the Modern hosted email systems are good, but they’re not perfect. Once in a while, you may see a message from what looks like a familiar sender – a colleague, a close friend, or even a family member.

What would they be sending? Links and attachments are the most typical contents of phishing emails. The idea is to convince the recipient to click the link, or to open the attachment.

Taking advantage of your trust

If you are not expecting an attachment from someone, be wary of opening it.


phishing

phish-ing

noun

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.”an email that is likely a phishing scam”

Oxford Languages

What is it?

How to spot it?

Federal Trade Commission (FTC) has a great article on how to recognize and avoid phishing scams.

https://www.consumer.ftc.gov/ar.ticles/how-recognize-and-avoid-phishing-scams


Related Posts

Leave a Reply

Recent Posts

The Problem with Traditional IT Methods
October 19, 2020
Consulting Experts On Demand
September 5, 2020
Early Issue Detection Leads to Fewer End User Problems
August 5, 2020
Why Choose BsideIT for your IT Outsourcing Needs?
June 4, 2020
Think of Managed IT Services as Outsourcing Your Internal IT Department
May 19, 2020

Consulting Experts on Demand

BsideIT's leading information security services leads you in designing and implementing a powerful set of security policies tailored to protect your business from data breaches.

Interested In Our Services?