The year is 1995 and Sandra Bullock’s The Net is getting lampooned by viewers. People feel that the cyber thriller’s depiction of identity theft and evil hackers is too far-fetched. An easy conclusion to make in an age with no smartphones or social media. No wonder then, that Sandra’s journey to expose and report phishing attempts were laughed off by critics and cinemagoers alike.
In the years since, things have changed. People have accepted that Sandra is a great actress (with an Oscar no less), and that The Net, while not a piece of seminal filmmaking, got a lot right about cyberspace and its place in human society. Even the FBI concedes that email phishing leads to 90% of successful cyber attacks.
Yes, really.
It is important to learn how to report phishing and online scams properly.
You’ll be surprised how easy and painless it is to make phishers and cybercriminals pay.
What is phishing? They are fraudulent attempts to fish out personal or corporate information from you for malicious purposes. To steal your money, identity, even workplace secrets.
Well, now you do.
Before we get to the part about how to take these cybercriminals to task, we need to be aware of online scams in their various forms. And we’ve got just the thing to refresh your memory:
Next, we will discuss how to spot a phishing scam before it wreaks havoc.
There are over 5.19 billion internet users worldwide as of July 2023. They all have one common yet valuable commodity that cybercriminals want - data.
Hackers aren’t people who sit behind a computer and type fancy, techie commands to unearth your passwords. They rely on much more to target you. They can even turn on the charm to get information out of you in the most unassuming way.
Social engineering they call it.
These are some of the things social engineers need to get out of you to steal your identity:
PIN numbers
SMS codes
Passwords
Credit Card details
Bank Account information
Phone numbers
Personal identification
Answers to security questions
Multifactor authentication codes
Avoid giving out these types of personally identifiable information to anyone unless it is someone you absolutely trust.
Too much information to memorize? No problem. Just remember that any personal or sensitive information is off-limits to anyone.
Sandra Bullock’s Angella Bennett may have been targeted by a mere disc….
……but today’s hackers rely on more modern means to trick you:
Fraudulent emails and other messages that look like they're from legitimate companies
Misleading pop-ups or ads that say your device has a severe security problem
Scam phone calls or voicemails that impersonate Tech Support
Fake promotions offering free products and prizes
Unwanted invitations and subscriptions
Social engineers can target this Sandra:
Also this one:
As well as this one:
But not if you ignore these scammers. It is that simple.
If you receive an urgent request that doesn’t seem right, hang up or close the message. You aren’t being rude — you are being wise.
Actions to avoid:
Do not sign on to your account from a link embedded in a suspicious message
Do not share personal account information such as your PIN, password, or one-time access codes
Do not click any links or open attachments, which can install malware on your device
Do not call phone numbers included in any communication unless you’re sure of the source
Do not allow remote access to your computer
Do not give any information to emails, calls or websites that offer government services
Some of us want to make the virtual world a better place. Because for all practical reasons, we rely on the internet to work and stay in touch with our loved ones.
In this case, there are two things you can do:
Use the “Report” feature in your email, communication or social media app.
Forward the details of a phishing scam to the relevant governmental authorities:
Cybersecurity is a vast area and social engineering techniques rely on targeting the weakest link - the human link. We’ve discussed a few tips that, along with a robust cybersecurity awareness training program, can help you deal with the majority of cyber attacks, especially those that involve phishing or spam.
Note: This blog is part of Pureversity's Cybersecurity Awareness Month 2023 coverage, aiming to empower you, your home, and your workplace with an improved cybersecurity posture.