4 keys to identify and avoid phishing attacks

These clues will help you stay on guard

4 keys to identify and avoid phishing attacks

The period which comes after the holidays brings with it a new era of sales during which cybercriminals take advantage of the increase in the volume of digital transactions to launch phishing campaigns in search of new victims. 

Over the past year, phishing attempts have increased by an alarming 40.9%, with the creation of 1.5 million new phishing websites every month.

READ MORE: How well can your staff detect phishing attacks?

Phishing, which is a type of cyber threat through which a cybercriminal tries, fraudulently, to collect confidential information pretending to be a trusted company or person, is one of the most used types of cyberattacks worldwide. 

This type of attack has a great percentage of success, since thousands of people are victims of scams through emails that offer great discounts, exclusive advantages, and more.

However, the risk of being the next victim of a phishing attack can be reduced by simply following these four keys to identifying these emails:

1. Haste is never a good adviser

Cybercriminals try to impersonate large established companies to take advantage of their image and the trust users have in them. In general, the messages they send stand out for their urgency, inviting the recipient to take advantage of great discounts or demand that the recipient verify some personal data for security reasons or to not lose their user account.

READ MORE: Are 'impulsive' staff exposing you to cyberattacks?

2. Lack of personalisation

Emails that are part of a phishing campaign are communications that hardly show closeness to the recipient and tend to generalised greetings as “dear customer”, rather than personalised options that include the client's first and last name. In addition, on many occasions, the "To" field of the email, that is, to whom this email is addressed, is empty. Therefore, it shows that it does not reach us from a company that actually has all our data. These are indications that show that it is not an official communication by a company, but that someone is impersonating their identity for their own benefit.

3. They incorporate attachments or several links

Although it is true that an informative email sent by a company usually incorporates a link so that you can visit its website, it is normal that this type of communications does not include attachments or many links. Check Point experts point out that it is essential not to download any type of file if the sender of the email is not fully trusted. They also warn that differentiating a malicious link is simple: you just have to hover your cursor over the URL (always without clicking) and see the address from which the link actually derives. If it is not the advertised website or it is not trusted, it should not be clicked under any circumstances.

4. They send the mail to an account that is not registered to the service

The number of digital platforms to which we are currently subscribed causes many users to create accounts that they use exclusively for specific types of services, in addition to the ones they already have for personal, professional use, etc. For this reason, when an email arrives, it is essential to first ask if that is the address with which we are registered, since, if it were not, it would be a clear indicator that someone is trying to steal information from us.

Phishing is one of the threats with more history in the world of cybersecurity, and although it is at a lower level of technological development than the new generations of cyber attacks, its success rate is still very high. However, avoiding its effects is a matter of a simple basic concept: prevention. At Check Point, we highlight that, the more cautious, better informed and more users think before clicking, the greater their level of protection against these types of risks.

Clement Lee is principal consulting security architect in the Asia Pacific for Check Point Software Technologies

Recent articles & video

Teacher censured for accessing porn on school-issued laptop

Carpool woes: Worker claims additional pay for driving colleagues to work

'Tougher market' ahead for jobseekers as NZ enters recession

Talent mobility: What’s the most challenging country for remote workers?

Most Read Articles

Employer assigns manager to smaller area – is it constructive dismissal?

Unjustified dismissal: technician who didn't have enough work wins over $20,000

Company blocks former worker's employment with competitor