Tips for Avoiding Phishing Email Traps

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Tips for Avoiding Phishing Email Traps-4 Next

Be wary

If you get an email from your bank, doctor, house/auto lender, etc. that is asking you to supply personal information, take steps to verify the origin of the email. Contact the purported sender directly (don't click on the 'customer support' link as it may redirect you to a malicious site) and see if they actually sent out that email. Doctor's offices, banks, and other financial institutions are actually pretty good about not sending or soliciting information over email so, chances are, someone is trying to take you for a ride. 

When the holidays come around, many of us are busy with planning, gift buying and decorating, oftentimes forgetting to be diligent when accessing the web. Cyber criminals are well aware of this and are getting sneakier and changing tactics –  moving from malicious attachments to "watering hole" style attacks that lure victims to a trusted (but compromised) URL destination.

During this time of year, people make more online transactions than usual, so it's essential to be extra careful when sending financial and/or personal information, even to sources you think are reputable. While you may think you are saving time having a website save your details or registering with a website, make sure you think about how many new ways you are opening yourself up to having those details stolen should those sources become compromised by attackers. Not taking these steps to protect yourself could turn a morning of building your sweet new Lego Millennium Falcon into months of picking up the pieces of your now-stolen identity.

In this slideshow, AlienVault has identified common phishing traps users should avoid.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.