• Home
  • WORDPRESS
    • PLUGINS
    • PHP
    • Themes
    • DEVELOPMENT
      • Javascript
      • JQuery
      • Mootools
  • WEB DESIGN
    • DESIGN
    • CSS
    • HTML
  • TYPOGRAPHY
    • FONTS
  • RESOURCES
    • TUTORIALS
    • THEMES
    • SLIDERS
    • TECHNOLOGY
  • ARCHIVES
  • CONTACT
  • Advertise

Code Geekz

    • Most Popular

      All time

    • 30 Best Tools for Data Visualization

      37 Comments

    • Best PHP Frameworks for Developers

      33 Comments

    • Latest Stories

      What is new?

    • Building Product Teams That Scale: The Case for Remote .NET Developers

      May 21, 2025

    • Choosing a WooCommerce Theme? Here’s What Most Store Owners Get Wrong

      May 9, 2025

    • Comments

      Most Recent

    • B. Frances on:

      Best WordPress Wedding Themes

    • Ultimate Content Locker Pro on:

      Best WordPress Social Content Locker Plugins for 2017

  • Home
  • WORDPRESS
    • PLUGINS
    • PHP
    • Themes
    • DEVELOPMENT
      • Javascript
      • JQuery
      • Mootools
  • WEB DESIGN
    • DESIGN
    • CSS
    • HTML
  • TYPOGRAPHY
    • FONTS
  • RESOURCES
    • TUTORIALS
    • THEMES
    • SLIDERS
    • TECHNOLOGY
  • ARCHIVES
  • CONTACT
  • Advertise

Understanding the Basics of How Phishing Attacks Work

0
  • by Gavin
  • In Best Practices · Technology
  • — 15 Nov, 2019

There was a time when talk of online security centred around which antivirus program you were using, and not much else.

Then, we were unfortunately introduced to the term (and associated problems) of malware and ransomware. Companies fortified their defences with firewalls. Colocation server farms employed armed guards. And yet, the hackers and cyber scammers have kept at it, getting increasingly sophisticated with their methods.

Nowadays, while viruses and malware haven’t gone away, the most likely security risk you and your business will come across will take the form of a phishing attack.

Phishing in simple terms

So, how do phishing attacks work? In simple terms, a phishing attack is an attempt to fool a user into thinking an email or link is from a trusted source, when it is in fact, not. The intended result of a phishing attack is to gain access to sensitive data (such as user names and passwords) or to deploy malicious software upon a user’s system or business network.

Anybody who has an email account has most likely come across a phishing attack at some point in their online life. Some are less credible than others, where poor grammar and odd-looking company logos tend to give away the legitimacy of the scam, but the cleverness of these attacks is getting far better with each passing year.

The reason phishing attacks are so popular within the cybercrime world, is that they are unfortunately very profitable. Because the attack relies on human interaction, the chances of a mistake being made by an employee are extremely high, especially if they haven’t been trained in what they should be looking out for.

Humans are fallible, and as such. we will always be the weakest link in the security chain when it comes to cybercrime.

A panicked user is an easy target

Often, the phishing attack will take the form of a call to action, where the sender will try to panic the recipient into acting quickly, not paying attention when they do. This is “social engineering” at its most vicious.

One example of this would be an “unauthorized login attempt” email, tricking the user into clicking a link purporting to be that of a bank or online service. Other attacks tend to rely on the familiarization a user has with a particular service. An example of that would be an email masquerading as a file-sharing service, telling the recipient than a file has been shared with them from another co-worker.

Both of these attacks will result in the user being sent to a site that looks authentic, but is in fact a spoof site set up by a cybercriminal.

Training to reduce the threat

Combatting this sort of attack is not as simple as updating an antivirus. While phishing filters within email clients will catch a number of attempts, training staff members to spot the signs of phishing attacks is by far the best option for companies looking to reduce the associated risks.

Once a team has been trained and new regimens implemented, it becomes second nature to, for example, check that the URL of a link is an official, legit one.

Another simple technique to thwart phishing attacks is to simply avoid clicking on links in emails, and go directly to web services by typing the address in the browser window. It can take a while to encourage this habit, but once it becomes routine, the security risk diminishes rapidly.

While phishing attacks are always likely to be a threat, reducing the risks is something all companies should be doing going forward. With these sorts of attacks on the rise, it would be foolish to either play the risks down, or expect every member of a team to intrinsically know what to look for.

Stay off the hook

With plenty of tools available to help mitigate other security threats in existence, the one area all businesses can help build their own defences is by training staff in how to detect phishing attacks.

When you consider that even giant corporations and institutions can fall at this hurdle, the SMBs of tomorrow will surely have to take the threat seriously, or prepare themselves to face the costly and time-consuming consequences.

Share

Tags: phishing attackphishing attackssecurity risksimple termstraining staff

— Gavin

A Web addicted Geek stuck inside Tron.

  • Previous story Placeit Logo Maker Review
  • Next story Importance of Using Data Recovery Software

You may also like...

  • write expert article How to Write an Expert Article? Top Steps to Quality Text
  • 3 Things to Do When Building Your Own House
  • Key Things You Should Know About VPNs
  • Why Remote Work is the Best Way to Scale Your Team and Increase Productivity

Enter your em@il & get our posts delivered.





  • Enter your em@il & get our posts delivered.

  • Codegeekz
    • Home
    • Best Practices
    • Understanding the Basics of How Phishing Attacks Work
    • Home
    • WORDPRESS
      • PLUGINS
      • PHP
      • Themes
      • DEVELOPMENT
        • Javascript
        • JQuery
        • Mootools
    • WEB DESIGN
      • DESIGN
      • CSS
      • HTML
    • TYPOGRAPHY
      • FONTS
    • RESOURCES
      • TUTORIALS
      • THEMES
      • SLIDERS
      • TECHNOLOGY
    • ARCHIVES
    • CONTACT
    • Advertise

    CODEGEEKZ.COM