PHISHING
PSST!! IT’S
PHISHING
THAT’S THE
DANGER
THE TARGETS: Everyone is a target, from
small-business owners and government
employees to students and retirees. If you
have an email address, you’re at risk. There’s
even a subdivision of phishing called Spear
Phishing, which directs attacks at senior
leadership and high-profile candidates
ranging from corporate executives to major
nonprofits to government leaders.
WHAT HAPPENS WHEN YOU CLICK ON THE
LINK? The most common result is that you’ve
released malware that harms your computer.
It allows the intruder to gain access to
private information such as usernames
and passwords. But it can get worse. Some
intruders will shut down your computer and
force you to pay a ransom to regain access. It’s
ransomware, the ultimate digital blackmail.
BY: ANTHONY MONGELUZO
PRESIDENT, PCS
P
ronouncing the word—phishing—
might provide a verbal stumble
(it’s pronounced “fishing”), but it
creates mayhem for everyone who
uses a computer or digital device,
often with devastating results.
WHY PHISHING WORKS. Phishing is
everywhere because of our digital world, with
emails as a prime example. In 2017, hackers
sent about 269 billion emails (that’s billion)
and expect to reach 333 billion by 2020.
WHAT IS PHISHING? Phishing is the illegal
practice of trying to trick someone into
opening a malicious email, then interacting
with them to benefit the intruder and harm
the email recipient. Invaders try to gain
access to your usernames, passwords and
other sensitive information.
AT PCS, WE HAVE ONE GOAL:
Phishing is a fear monger, which allows it to
work so effectively. It occurs with delivery
notices (FedEx, UPS, etc.), voicemails,
coupons, false invoices, faked accounts, and
late health club notices.
The idea is simple:
create fear or tension in
recipients and get them
to react. By creating
this emotion, many
people click on the link
provided (“What do you
mean I owe the IRS?!”) If
even one person in your
organization or company
clicks on the link, the
invader can compromise
and devastate your entire
network.
We Strive to Be the
Most Helpful IT
Company in the World.
877.596.4446
www.helpmepcs.com
26
ARE SMALL BUSINESSES
OR ORGANIZATIONS
SAFE? No. Remember
it is software programs
(powered by artificial
intelligence) that are
searching for computers.
They don’t know if you’re
a mom-and-pop or a
billion-dollar corporation.
Sometimes, they’re not
after your information but
your clients’ or customers’
data.
Anthony Mongeluzo has spent two
decades fighting intrusions on personal
and business computers. Mongeluzo is
president of PCS, a 130-person IT firm
with offices in New Jersey, Pennsylvania,
Delaware, Maryland and New York. For
more information, visit:
www.helpmepcs.com.
HELP! HOW CAN I PROTECT MYSELF? No
perfect method exists, but you can minimize
entry with these actions:
• Question every email. Sometimes you can
tell when an email doesn’t seem quite right.
• Question every pop-up. Don’t let a pop-up
tantalize you into action.
• Ask. It’s amazing how people are afraid to
ask an administrator or technician simple
questions about security.
• Hover over the link. You can often tell
something is “fishy” about it.
• Never send an email confirmation.
• Question every attachment. Many
journalists will never reply to an email that
has an attachment. They want their devices
to remain virus free.
Security systems are constantly changing. You
can only protect yourself by having the latest
security updates, a strong malware program
and following common-sense security rules. If
you have an organization or business, you must
ensure that your IT techs not only understand
your network but that they are familiar with the
most recent security protocols.
When in doubt, “go old school.” Use what I refer
to as “high-speed voice technology.” If the email
is from someone you know and it looks fake, pick
up the phone and call them to verify. +