Identify and avoid typical internet scams: a guide from Slingshot
Cyber-attacks are on the rise, and anyone can be a target. Whether it's through phishing emails, compromised accounts, or phone calls, scammers use various methods to trick you into giving up your personal or financial information. In this post, we will cover some of the most recent attempted intrusions observed at Slingshot and how you can protect yourself from Cyber Attacks.
Phishing Emails
Phishing involves sending fraudulent emails that appear to come from legitimate sources, such as your bank, your employer, a business contact, or a government agency. The goal is to lure you into clicking on a link, opening an attachment, or entering your credentials on a fake website. The link or attachment may contain malware that infects your device, or the website may steal your login details or other sensitive data.
How to spot a phishing email: Look for spelling and grammar errors, mismatched sender names and addresses, urgent or threatening language, or requests for personal or financial information.
How to protect yourself from phishing emails: Don't click on links or open attachments from unknown or suspicious senders. Verify the sender's identity by contacting them through another channel. Use a strong and unique password for each account and enable two-factor authentication.
Email Compromises
Email compromise involves gaining unauthorized access to an email account and using it to send malicious emails to the account owner's contacts. The attacker may use the compromised account to impersonate the owner, request money or information, or spread malware. The attacker may also use the account to access other online services that are linked to the email address, such as social media, online banking, or cloud storage.
How to spot an email compromise: Look for unusual or unexpected emails from your contacts, such as requests for money, personal information, or urgent favors. Check your sent folder and trash folder for any emails that you didn't send or delete. Look for signs of unauthorized activity on your other online accounts, such as password changes, login alerts, or transactions.
How to protect yourself from email compromise: Change your email password immediately and use a strong and unique password. Always enable Multi-Factor Authentication. Notify your contacts that your email account was hacked and warn them not to open any emails from you that seem suspicious. Review your email settings and revoke any unauthorized access or forwarding rules.
Telephone Scams
Telephone scams are a type of cyber-attack that involves making fraudulent phone calls to deceive unsuspecting individuals. The caller may pretend to be a representative from a bank, your health insurance agency, a government agency, a tech support company, or a charity. The caller may claim that there is a problem with your computer, your bank account, your taxes, or your social security number. The caller may ask you to verify your personal or financial information, pay a fee or a fine, or purchase a gift card or a wire transfer.
How to spot a telephone scam: Look for pressure tactics, unusual requests, spoofed numbers, or poor-quality calls. Legitimate organizations won't ask you to verify sensitive information over the phone, pay with gift cards or wire transfers, or threaten you with legal consequences.
How to protect yourself from telephone scams: Hang up immediately if you receive a suspicious call. Don't engage in conversation or provide any personal or financial information. Call the organization directly using a trusted phone number (not the one provided by the caller) and ask if there are any issues with your account or service. Educate yourself and your family members about common phone scams and how to avoid them.
Cyber-attacks can cause serious damage to your organization’s reputation, privacy, security, and finances. By being aware of the common signs and methods of online scams, you can reduce your risk of becoming a victim. If something sounds too good to be true, it probably is. Stay vigilant, trust your instincts, and protect your personal information.
Slingshot Clients should not hesitate to contact our helpdesk for review of any suspicious emails, or calls.
Slingshot Clients should notify our helpdesk immediately when they have any concerns or think they may have been scammed.
Slow down and think it through before you click. Get help.
If your Spidey Senses are tingling, hang up on an unusual caller, and delete the email.
NEVER enter your email credentials into a website form and NEVER forward your Multifactor Code to anyone. There is no legitimate reason for anyone to know your secret email password.
If you need CyberSecurity guidance to protect your organization, contact Slingshot to schedule a free IT Systems review
Comments