Electronic mail is used often by cyber criminals to spread malware among users into an organization. Some email messages are so well crafted that even IT professionals fall for them. Email security is further complicated by the fact that a recipient cannot absolutely be sure about the identity of the sender.
An improper response to an email message can bypass all security measures that a person or organization may have put in place. No matter what malware protection or network security protection technique is used; all it takes is one person responding to an email with personal or other sensitive information, or simply clicking on a link that takes them to an attacker's web site.
There are plenty of examples in the media of accounts being stolen and data security breaches that, when investigated, turned out to be the result of one person making a simple mistake.
Phishing
Phishing commonly refers to a method of collecting information by luring users into disclosing information or following a link that may lead to infecting a person's computer with spyware or other forms of malware. In a typical scenario, a user receives an email that requests personal information such as username or password. It may also claim to be from a system administrator and ask the user to follow a link and enter personal account information. Such details are then used to access personal or institutional resources where important and confidential information is stored.
"Spear Phishing" is a special case of phishing where the the email message targets a specific individual or organization. Such messages are very well crafted and sometimes include personal or confidential information that is not publically available. The sender is simply trying to gain the trust of the recipient and is luring them to provide even more sensitive information or access.
Vishing
Vishing, or Voice Phishing, is similar in principle to Phishing, except that the would-be intruder calls the victim and tries to manipulate them into disclosing additional information. For example, someone may call and ask for a specific person, provide their name, address, and phone number, and then pretend that s/he is trying to complete their application for a free credit card; all they need is their personal ID number, bank account information, etc. The information gained from such a conversation can later be used to dig deeper into personal or institutional information that is more sensitive in nature.
Safety Tips
Pay extra attention to the following guidelines and recommendations:
- Do NOT click on links that you receive in email messages unless you are absolutely sure they are safe.
- Do NOT respond to email messages or phone calls that request personal or confidential information.
- Do NOT send confidential information from work by email without proper authorization
- Do NOT send confidential information to hosted personal email accounts such as Gmail or Yahoo!
- Verify the identity of the person/people requesting information
Report Malicious Activities
If you are the target of such attempts, please
report this to us as soon as possible. We will then investigate the case further and identify any other potential victims and take other action to protect from these attempts.