Phishing scams occur often and continue to sound more and more believable.
Phishing typically starts with an email that appears to come from a reputable company or someone you personally know and would recognize. In some cases, this email may appear to come from a government agency making you more likely to interact with it. The email may contain a link that requires your immediate attention. A phrase like “Immediate Attention Required” or “Please contact us immediately about your account” may be included on the email to encourage you to open the link.
The link may lead you to a fraudulent website that asks you to update your account information for verification. Its main objective is to deceive you into disclosing your social security number or other personal details that could be used to steal your identity.
Types of Phishing Attacks
Email phishing attacks are common, but are not the only methods hackers use.
Whaling
This method targets high-level executives to, in hopes, dupe an executive to retrieve valuable company information. Whaling emails may be identified by incorrect domain addresses, use of a personal email and not a work email, and new contact requests.
Voice Phishing
This tactic, known as “vishing,” involves scammers calling your phone in an attempt to steal your personal information and money. Hackers do this by using sophisticated technology like AI to sound like someone you know. They can also use technology that changes their caller ID to look identical to someone in your contacts.
Some common tactics for this methods include:
- A family member is in trouble and needs money
- The IRS needs your social security number to confirm tax returns
- A warrant is out for your arrest
- Or, your bank account has been flagged for suspicious activity
SMS Phishing
SMS phishing uses text messages with links or attachments to encourage you to click on them. These attachments may request personal or bank information, or lead you to spam websites. You can identify this tactic through unknown numbers, authentication requests, and unsolicited texts.
Hackers employ various phishing techniques, so it’s crucial to familiarize yourself with these methods to reduce your risk of falling victim to scams.
Falling Victim
Some scams sound real, so it’s not uncommon for some people to fall victim to them. Contact your financial institution and alert them of the situation, if you happen to find yourself a victim of a scam
If a phishing attack occurs at work, notify your supervisor and HR member.
If you’ve disclosed any sensitive or personal information, contact one of the 3 major credit bureaus and discuss whether you need to place a fraud alert on your file. A fraud alert will prevent scammers from opening accounts in your name or accessing your money.
Protecting Yourself
Falling for a scam can be scary. Scammers can take large amounts of money out of your accounts, steal your identify, and more. Here are some helpful tips you can use to keep yourself and your personal information safe:
- Never provide personal or company information in response to an unsolicited request
- If you believe the contact may be legitimate, contact your financial institution yourself or whoever the email may be about
- Never click on any links in suspicious emails
- If you receive suspicious emails requesting information at work, notify your supervisor
- Never provide passwords over the phone or in response to an unsolicited internet request
- And, receive account statements regularly to ensure all charges are correct
Resources
For more information regarding scams and safety measures, visit the Federal Bureau of Investigation’s (FBI) website.
Conclusion
While scammers may never be completely eradicated, it’s essential for you to stay informed and share that knowledge with others to help combat fraud. Never disclose personal information, don’t let scammers intimidate you, and if you become a victim, take swift action. Report any suspicious calls and emails immediately.