Tips for Avoiding Phishing Email Traps

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Tips for Avoiding Phishing Email Traps-3 Next

Pay Attention

This may seem obvious, but your best defense is to pay attention when surfing the web. This includes knowing what sites you are accessing, who you are giving your personal information to, and what files you are opening. 

When the holidays come around, many of us are busy with planning, gift buying and decorating, oftentimes forgetting to be diligent when accessing the web. Cyber criminals are well aware of this and are getting sneakier and changing tactics –  moving from malicious attachments to "watering hole" style attacks that lure victims to a trusted (but compromised) URL destination.

During this time of year, people make more online transactions than usual, so it's essential to be extra careful when sending financial and/or personal information, even to sources you think are reputable. While you may think you are saving time having a website save your details or registering with a website, make sure you think about how many new ways you are opening yourself up to having those details stolen should those sources become compromised by attackers. Not taking these steps to protect yourself could turn a morning of building your sweet new Lego Millennium Falcon into months of picking up the pieces of your now-stolen identity.

In this slideshow, AlienVault has identified common phishing traps users should avoid.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.