ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Let’s Take a Look at Phishing Attacks

Let’s Take a Look at Phishing Attacks

Phishing attacks are growing in number and it presents a major challenge for businesses. The many different forms that these attacks come in just exacerbates the problem. Today, we will take a brief look at phishing to help you educate your staff on what they entail and how to mitigate the massive risk that comes with them. 

Phishing Attacks

A phishing attack comes in as communication from a trustworthy source as to fool the recipient to interact with it. This could be in the form of an email, a text message, a phone call, or really any other form of direct communication. The goal is to manipulate the recipient into providing access credentials to network-attached resources so they can steal data or deploy malware. 

Since phishing can come in several different forms, it is an effective way to breach your network defenses because the scammers are given access, they don’t have to try and outright breach your network defenses, which in many cases are extremely hard to hack into. Let’s take a look at some of the ways these scams are disseminated.

Business Email Compromise

In a business email compromise scam, the scammer will send an employee an email that, at first glance, comes from an authority figure inside of the business. The messages will be quite vague, but direct the recipient into taking some type of action that will allow the hacker to gain access to resources. Many employees will not think twice when their manager tells them to complete a task, so phishing attacks of this type are successful because people don’t take the time to ascertain that the message isn’t actually from anyone. 

Hackers use this method because they work. In Q2 of 2020, successful business email compromise scams averaged $80,193. 

Clone Phishing

One of the most successful phishing scams is using a clone of a message a recipient would have seen before. By gaining access to data beforehand, the hacker can customize a message that looks like one they have received previously. Typically, this type of familiarity removes any suspicion that the message is actually from a scammer. The links are altered to reroute to a site where scammers collect more information. Pretty crafty way to steal credentials. 

Smishing

Email may be the predominant way that phishing is pushed to people, but it isn’t the only way. Smishing attacks are carried out through text messaging. Most people are much less careful about opening and interacting with text messages than they are with their email, and as a result scammers have started pushing phishing messages that look like legitimate messages through SMS. If you also consider that mobile devices often don’t uphold the same security standards that PCs do, users are more vulnerable through an SMS attack. 

Spear Phishing

The spear phishing attack is probably the most dangerous of the phishing scams. First of all it is deliberately designed for a single user. The hacker, in this case, has already done their due diligence and chose their target based on information they already have about the target. Since these attacks take more time to properly execute, spear phishing is typically carried out against high-value targets. The success rate of these attacks are significantly higher than your average, run-of-the-mill phishing attack

Vishing

Another take on phishing, vishing is just phishing over the phone. A scammer will call a target under the guise of a salesperson or finance professional, and because of their perceived legitimacy, the scammer can typically extract information that will help them gain access to computing resources, or at the very least the target's personal or financial information.  

Whaling

Whaling is a phishing attack, typically a spear phishing attack, aimed at business owners, decision makers, and executives at businesses. These attacks, because they are aimed at people who have access to everything, often are well planned; and, if successful often result in the biggest bounty for the perpetrator.

Phishing is a Serious Threat

You need to have a strategy in place to combat phishing as it is not going anywhere, anytime soon. If you would like to talk to one of our consultants about developing a plan to train your people about phishing attacks and what to do if they come across one, give us a call at 866-326-7214 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Data Backup Ransomware Smartphone communications Smartphones Small Business Microsoft Office Upgrade Network Mobile Devices Data Recovery Communication Managed IT Services Productivity Quick Tips Social Media Users VoIP Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Covid-19 Passwords Holiday Disaster Recovery Apps IT Support Browser Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Remote Work Internet of Things Managed Service Provider Data Management Government Saving Money Operating System Networking Workplace Strategy Windows Artificial Intelligence Managed IT services Gadgets Mobile Device Management Remote Bandwidth Business Technology Blockchain Encryption WiFi App Server Virtualization Information Spam Employee/Employer Relationship Apple Information Technology Gmail Office Two-factor Authentication Office 365 Budget History Health Cybercrime Analytics Conferencing Big Data Access Control Data Security Wi-Fi BDR Compliance IT Management Cost Management Training Remote Computing Help Desk Voice over Internet Protocol Document Management Hacking Patch Management Save Money Vendor Hacker Remote Monitoring Employer-Employee Relationship Retail Customer Service Unified Threat Management Computing Alert Firewall Vendor Management Hard Drive Hiring/Firing Augmented Reality Word Outlook Data loss IBM Password Website Legal Mobile Office Data storage Managed Services Applications Search... Vulnerabilities Project Management Best Practice Money BYOD Sports Social DDoS Websites SaaS Meetings Mobility iPhone User Cortana Google Maps Education Scam Twitter Content Filtering Law Enforcement End of Support VPN Router Chrome Printer Update Remote Workers The Internet of Things YouTube Windows 11 Data Breach Windows 7 Free Resource Mobile Computing Travel Marketing Virtual Reality Laptop Paperless Office How To Social Engineering Antivirus Cryptocurrency Running Cable Maintenance Black Market Cleaning Monitoring Storage Healthcare Robot Computer Care Saving Time Downloads Employees Avoiding Downtime Vulnerability Solid State Drive Computers Bitcoin Software as a Service Holidays Telephone Disaster Data Protection HIPAA Chromebook Drones Cooperation Video Conferencing Automobile Lithium-ion battery Excel Virtual Machines How To Computer Repair Microchip Processors Flexibility Professional Services Tech Terms Virtual Assistant Managed IT Hack PowerPoint Identity Theft Digital Administration Managed Services Provider Notifications Unified Communications Virtual Private Network Presentation Taxes Specifications Processor Google Docs Bluetooth Wireless Technology IT Consultant Distributed Denial of Service Current Events eWaste Office Tips Solutions Memory Private Cloud Customer Relationship Management Co-Managed IT Downtime Physical Security Entertainment Safety Integration Multi-factor Authentication Images 101 Display Politics Virtual Desktop Settings Experience Start Menu Machine Learning Wasting Time Banking Wireless Headphones Google Wallet Microsoft Excel Vendor Mangement Business Cards Samsung Tech eCommerce Messenger Going Green Point of Sale Modem Deep Learning Error Staffing Uninterrupted Power Supply Videos Webcam Surveillance Troubleshooting Bookmark Managing Costs Business Metrics Shortcuts Hosted Solution IP Address Business Mangement Piracy Tablets Term Books Download SSID Employer/Employee Relationships Language HTML Society Media Development Supercomputer Browsers Virtual Machine Nanotechnology Be Proactive Google Calendar Software License Virus Visible Light Communication Reviews Google Play Optimization Reading Upload Monitors Social Network Teamwork Recovery Windows 8 Competition 2FA Motion Sickness Data Storage Business Owner Data Analysis Hypervisor Screen Reader Workplace Strategies Comparison Google Drive Mobile Technology Advertising Entrepreneur Shopping Security Cameras Relocation LiFi Trends Medical IT Displays Customer Resource management SQL Server Work/Life Balance Documents Devices Knowledge Tech Support Application Corporate Profile Paperless Business Intelligence Employer Employee Relationship PCI DSS Fileless Malware Licensing Television Tip of the week Telephony Company Culture Cabling Gig Economy Humor Gamification In Internet of Things Telephone System Azure Securty Regulations Tablet Business Communications G Suite Internet Service Provider Tracking Regulations Compliance Inbound Marketing Directions Managed IT Service Hacks Backup and Disaster Recovery Smart Technology Mouse Network Congestion Domains VoIP Writing Desktop Memes Reliable Computing Content Electronic Medical Records Accountants Human Resources Web Server Net Neutrality Digital Payment Financial Data Database SharePoint Worker Risk Management Electronic Payment IT Scalability Administrator Health IT Text Messaging Equifax Proactive IT Public Speaking Access Google Apps Public Cloud Telework Bring Your Own Device Streaming Media Tactics Supply Chain Hard Drive Disposal Time Management Microsoft 365 Keyboard Smartwatch Communitications Phone System Username Procurement Startup Audit Music Hard Drives Freedom of Information Spyware intranet File Sharing FinTech Navigation Addiction Workplace email scam Wireless Mobile Security Redundancy Shortcut CES IT Assessment Supply Chain Management Botnet User Tip Value Legislation Heating/Cooling News Cache Environment Social Networking Workers Organization Evernote Cyber security Rental Service Computer Accessories Windows XP Network Management Scams Micrsooft Unified Threat Management Flash Smart Devices Remote Working Proxy Server Telephone Systems Emails Printing Business Growth Fake News CCTV Touchscreen AI Trend Micro Service Level Agreement Cables Computing Infrastructure Management Transportation Device security Emergency Digital Security Cameras Computer Malfunction Electronic Health Records

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?