Sales/Support: 877-667-3887 | Support Center

HostUtopia.Blog

Protect Yourself From Phishing

Jul 18, 2024 | #Security #InternetSecurity #WebsiteSecurity

Protect Yourself From PhishingWhat is Phishing?

“Phishing” is when criminals use email, phone and online scams to purposefully and maliciously trick people into sharing information such as passwords, Social Security numbers, account and credit card details. Phishing is Phraud and it is a crime.

Defend Yourself

Educate yourself, your family, and if applicable, your co-workers, clients and business partners on what Information Theft is, and what you can do to protect yourself. No legitimate business or government agency will ever ask for personal information via email or phone unless you initiate the contact. If you receive such a request, DON’T RESPOND.

Quick Facts

  • According to numerous published reports, Information Theft is one of the fastest growing crimes across the globe and occurs once every 79 seconds on average. In 2005, the cost to consumers was in excess of $5,000,000,000, while the cost to businesses was in excess of $47,000,000,000. The average consumer loss from a phishing attack is $1200.
  • According to a Symantec presentation, 1 out of every 125 emails sent is a phishing attack. In 2005, phishing attacks rose by 90%.
  • The Anti-Phishing Working Group reports that 5.7 billion phishing emails are sent each month, and that over 150,000 unique phishing attacks and 3,000 phishing websites are reported per month.

What information are Phishers after?

Phishers are interested in gathering information which, by nature, is private and/or confidential, especially if this information can help them steal your identity.

Information Theft targets a wide array of information, including, but not limited to:

  • Driver’s License Numbers
  • Date and Place of Birth
  • Mother’s Maiden Name
  • Account Numbers
  • PINs
  • Usernames
  • Passwords
  • Personal Information
  • Any confidential information that criminals can either directly use or resell

Defend Yourself

  • Do not disclose any personal information unless the requester has a valid need for the information.
  • Don’t hesitate to ask how your information is going to be protected.
  • Never agree to have your information shared or sold.
  • Remember: No legitimate business or government agency will ever ask for personal information via email or phone unless you initiate the contact. If you receive such a request, DON’T RESPOND!

How NOT to become a Victim

Phishing may appear to be an anonymous crime, but it is not a victimless crime. However, we have good news: simple techniques exist to NOT become a Phishing Victim.

Simple Techniques

  • Never provide confidential information unless you started the conversation. Never answer an email, pop-up, phone call, letter, etc. that asks for personal information. Legitimate companies do NOT ask for this information, ever!
  • Be suspicious! Because something is written down in an email or in a pop-up does not mean that it is true and legitimate.
  • Do not click on a link provided in an email or enter information in a pop-up window. Go to the website yourself and from there navigate to the area of interest.
  • Use anti-malware solutions that are updated. This will stop the installation of crimeware on your computer that could harvest your information.
  • Do not use public computers or wireless networks to conduct confidential activities. This includes wi-fi hot spots, kiosk computers, cyber cafés.
  • Shred all documents that contain personal, sensitive or confidential information.

What to do if you have been Phished?

If you are a phishing victim, it is important for you to follow these simple instructions to minimize the damage caused by the criminals who stole your information.

Report It!

  • Place a Fraud Alert on your Credit Report.
  • Close the accounts that you know, or believe, have been tampered with or opened fraudulently.
  • File a police report
  • Monitor your bank accounts, credit card accounts and credit report.

Spotlight on Reporting Action Plan:

  • Write down the name of everyone you talk to, what he or she tells you, and the date the conversation occurred.
  • Follow up in writing with all contacts you’ve made on the phone or in person. Use certified mail, return receipt requested, so you can document what the company or organization received and when.
  • Keep copies of all correspondence or forms you send.
  • Keep the originals of supporting documents, like police reports and letters to and from creditors; send copies only.

Remember:

If you are a victim of phishing, others in your community will be, too. The sooner you report it, the sooner you can help protect your community against these criminals!

Related Posts

WordPress Security Plugins

HostUtopia servers perform constant scanning of files for malware and known viruses. However we are often asked what the best WordPress Security Plugins I can install on my website myself for further protection? This isn't to say that WordPress is not secure, or that...

read more

5 Best WordPress Firewall Plugins Compared

Are you looking for the best WordPress firewall plugin for your website? WordPress firewall plugins protect your website against hacking, brute force and distributed denial of service (DDoS) attacks. In this article, we will compare the best WordPress firewall plugins, and how they stack up against each other. What is a WordPress Firewall Plugin? A […]

read more

About Google Chrome, cPanel, and SSL Certificates

What you need to know about SSL Certificates: Does the idea of improving your search engine rankings and offering your visitors better security sound like something you’re interested in? What if I upped the ante and told you can now get an SSL Cert for just $5.95/mo?...

read more