A scam whereby the victim is sent a message, usually by email or over the phone, persuading them to divulge sensitive information or tricking them into downloading malware.
Author: Phil Muncaster
One of the most persistent cyber security trends of the last few decades is phishing. Attacks surged by 11% over the past year and now account for 36% of breaches, according to the Verizon 2021 Data Breach Investigations Report (DBIR). It's time for action.
What is phishing, and how does it work?
Phishing is basically a confidence trick. Attackers typically impersonate a trusted individual or organization to persuade users to hand over personal information or unwittingly download malware onto their machines. They do this typically through malicious links and attachments in email or social media messages, though some attackers seek this information over the phone. Although tactics have evolved over the years, the end goal is usually to obtain login data or personal and financial information, or to install ransomware, cryptojacking malware or other threats.
What are the different types of phishing attacks?
Phishing was the highest volume of reported cyber crime in 2020, according to the FBI. Although the vast majority of attacks are email-borne, attackers use many other methods, too. Here are a few of the most common:
What could phishing cost my business?
Just one misplaced click could lead to:
How can I mitigate the phishing threat?
Fighting against phishing doesn't have to cost the earth. A combination of people, process and technology will help to drive a strategy founded on best practices. These include:
Learn more about the rise of social media-based phishing threats.
Preguntas frecuentes
A scam whereby the victim is sent a message, usually by email or over the phone, persuading them to divulge sensitive information or tricking them into downloading malware.
It could lead to data theft or ransomware, or it could become a launch pad for other attacks like cryptojacking.
Train your staff thoroughly, and back this up with technology such as DNS-based protection and AI tools.