logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
25th October 2019 by CyberVision 0 Comments 1720 Views
25th October 2019 by CyberVision in Business Security

Do not forget about the threat of Phishing

 

 

Phishing is still a very serious security problem that affects more people than it should. It is when a hacker attempts to obtain sensitive information such as usernames, passwords and even credit card details, by disguising themselves as a trustworthy entity, most commonly in the form of an email. The severity of this problem is often due to hackers using this information for malicious and criminal activities. Hackers are very good at this and have many ways to mislead victims into sharing their data. The main concern would be to figure out how to protect your information from these malicious attempts from the hackers. There are many ways to prevent this from happening, but the following is the most effective and easiest way to identify when to ignore requests such as these.

 

Using plain txt email

 

Ensure that your email account is set up to view emails using plain text as your default setting. Looking at links in plain text allows you to actually read the url and spot the suspicious ones used in a lot of phishing scams. Identifying these dodgy urls will save you from entering a website that could be detrimental to your overall online security status. This method is the best way to avoid any mishaps that occur so often with just a click of a button. Considering the fact that mobile and computer risks differ, exercising caution is still really important. Online security applies to every device used for the internet, so practising this method should apply to all of your devices.

 

One should also always make sure that the person you are communicating with is indeed who they say they are, and if in doubt, ask the person who made the request for information directly. It is unlikely that the person concerned will be irritated with your request if they are genuine and all you are doing is helping prevent your organisation’s security from being compromised.

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • cybersecurity
  • f-secure cyber security
  • online protection
  • phishing
  • scam
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo