Information Managers
  • Home
  • Services
    • All Services
  • Templates
  • Blog
  • Contact Us
  • Practice Management Success
  • Podcasts

Phishing Tales

Sharing is caring!

0 shares
  • Share
  • Tweet
  • LinkedIn
  • Email

“Hello Dear sir/madam, I have received large sum of money to be transferred to your bank account.  Please to email me right away with your account information. Many thanks.”

 

Ever get one of these emails? We're pretty good at recognizing this kind of scam, but cyber criminals are getting very clever at devising ways to hijack our personal data.

These kinds of attacks are called “social engineering attacks” and they include “phishing“, “spear phishing“, “pharming” and “vishing“. These attacks exploit human tendencies of wanting to be helpful to people in need, trusting those with some form of authority, or even just being curious or greedy.

Illustration from the Privacy Commissioner of Canada, www.priv.gc.ca

Illustration from the Privacy Commissioner of Canada, www.priv.gc.ca

Phishing awareness training is needed at all levels of your business – even CEO's have been caught by phishing scams. By claiming to be a system administrator who needs your password to fix your account, or your credit card company needing to verify your credit card number and expiration date, or someone from far away who will give you millions of dollars as soon as you send him some money first….these are all ways to gain unauthorized access to systems or information in order to commit fraud or identity theft.

4 Tips to Avoid Being a Victim

  • Install a firewall and anti-virus software on your computer.
  • Be suspicious of emails from financials institutions or other organizations that ask you to provide personal information online. Reputable firms never ask for information in this manner.
  • Look closely for clues to fraudulent emails like a lack of personal greetings and spelling or grammatical mistakes.
  • Verify a phone number before calling it – if someone left you a message or sent an email claiming to be from your financial institution, make sure you check that the number is the one printed on the credit card or your bank statement.

 

Celebrate Data Privacy Day with Information Managers!

Follow Data Privacy Day around the world using Twitter and #DPD15.

We are proud to be a Data Privacy Day Champ!

DPD_profile_icon (All Platforms)

#DPD15, phishing, Practical Privacy Coach

Search the site

What is the elephant in the room?

The Elephant in the Room Find out here...

Privacy Policy

The Data Privacy Day E-Course was very helpful and it made you think more seriously. I actually made some changes to my computer along way.

- Danielle

Register for Free On-line Privacy Breach Awareness Training!

Privacy Policy

Copyright 2022 Information Managers Ltd.

0 shares
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}