Skip to main content

Common Sites of Phishing Attacks

In the News  

Phishing attacks target highly popular and frequently used companies the most. In Microsoft, PayPal and Google Top the Brands Hit by Phishing, Kacy Zurkus at InfoSecurity Magazine discusses a Global Threat Report that claims Microsoft, PayPal, and Google combined account for 45.7% of total phishing attempts at companies. Zurkus explains that phishing emails entice action by being labeled as urgent or containing useful information. Zurkus furthers that these phishing attacks are transmitted either through email attachments or email URLs.
 

Our Take  

Most people are bombarded by countless emails every single day, and it can be challenging to keep track of all of the information received through email distribution. Phishing attacks aim to capitalize on the overwhelming reality of email usage and prey on individuals and companies by camouflaging themselves to appear legitimate. Such attacks urge individuals to act fast or click on attachments because they provide necessary information, but by clicking on a link or attachments without verifying its legitimacy, phishing attacks succeed in their goal. Whenever an email contains a link or attachments, one should always be able to open the contents another way. It is essential to think about what an email is asking from you; if you are not expecting information or if the email prompts quick action, take an additional few moments to verify that the email is legitimate to avoid falling prey to phishing attacks. With these attacks targeting favorite companies the most, it is vital that all individuals take additional precaution when opening email contents.
 

Recommendations  

How can you protect your data and finances from phishing attacks?   

  • Understand the risks of putting your personal information into the world, and only share what you have to    
  • Use safe password practices, and take advantage of Multi-factor Authentication where possible    
  • Avoid clicking directly on links or attachments, whether in email or social media – always search through your search engine to verify legitimacy and find the appropriate site      
  • Pay particular attention to messages that threaten to cut off a service or promise unlikely rewards–these are intended to get you to act quickly without thinking    
  • Stay up to date on the news regarding recent fraud and phishing attacks to see if you may have been affected

Leave a Comment