The fight on phishing – why it’s time to use multi-factor authentication

What Is Phishing?

Phishing attacks send fraudulent emails, texts, websites or phone calls to trick consumers into giving away sensitive information like credit card numbers, Social Security numbers, and bank account info. The best way to protect yourself from a phishing attack is to be aware of the telltale signs of phishing emails, texts, or phone calls.

How does phishing work?

Phishing is a common problem that usually begins with a fraudulent email or other communication that is designed to lure a victim. The message is meant to get the recipient to click on a link or open an attachment, thereby giving the cybercriminal the opportunity to gain access to sensitive personal and financial information.

What are the dangers of phishing attacks?

Phishing starts with a fraudulent email or other communication that is designed to lure a victim. The message is made to look like it is from a legitimate source but, in reality, it is not. The goal of the phishing ploy is for the victim to click on a link or open an attachment that looks real. Phishing attacks are designed to trick the victim into thinking she is dealing with a company or person she knows and trusts.

How do I protect against phishing attacks?

User education:
As phishing attacks become more frequent, so does the need for user security education. It is no longer enough to harden your corporate defences against phishing. You must also provide users with the knowledge and skills they need to protect themselves from malicious emails that try to steal sensitive information.

Security technology:
Phishing attacks are a major problem, creating a lack of trust among customers and hurting businesses’ reputations. The best approach to mitigating phishing attacks is to use a layered approach that includes all of the following:

Before we dig into each of these layers, let’s discuss why all of them are necessary.

SMS 2FA is not a complete solution for preventing phishing attacks.

Types of phishing attacks

Deceptive Phishing :
There are three common types of phishing attacks: spear phishing, whaling, and vishing. Deceptive phishing is the most common type of phishing. In this case, an attacker attempts to obtain confidential information such as usernames, passwords, etc.

 

Spear Phishing:
Attackers have long used phishing to trick users into giving up their information. In the last decade, phishing has morphed into spear phishing, which is an attack that uses personalized information to target specific individuals. This makes spear phishing attacks much more effective than traditional phishing attacks.

 

Whaling:
It’s no secret that whaling is a well-established cybercrime tactic. The technique has been widely used for many years now, although the actors responsible have often been a mystery. A new report from Cisco Talos aims to both improve the visibility of whaling campaigns, as well as provide some analysis into who is behind these activities.

 

Pharming:
Phishing has been around for a long time, through emails, fake pop-ups, and other means. Recently, “pharming” has become a popular means for hackers to obtain the details of users for illicit purposes. Pharming is similar to phishing, but instead of a hacker sending you an email or some other form of communication, they redirect you to a website that looks legitimate or official.

Reel in your phishing risk with multi-factor authentication:

There are many vulnerabilities and attack vectors that all businesses must secure, but often the unknown is what is the most dangerous. With emerging trends in attacks and cybersecurity threats, there are many business owners questioning how to protect themselves from the latest hacks. Because of this ever-changing nature of attacks, businesses need to be proactive and not reactive when it comes to securing their digital assets. Here are some new cybersecurity threats for 2019/2020 that all businesses should be aware of.

When we’re talking about cybersecurity, there really is no way to prevent a breach in 100% of the cases. Which is why cybersecurity practitioners and experts are focused on implementing multiple layers of protection — a variety of different authentication factors — to make it as difficult as possible for hackers to infiltrate systems and steal information. And with the emergence of the 2FA, or two-factor authentication method, security professionals now have one more method at their disposal.

The old saying ‘better safe than sorry’ is always worth keeping fresh in your mind, especially when it comes to security. That’s why we keep hammering on the need for two-factor authentication. It really is a simple way of making it much harder for criminals to access your accounts.

Two-factor authentication is an extra layer of security for your account. When you log in from a new device or location, you’ll need to provide 2 pieces of information: your password and a unique code we text to your phone. Two-factor authentication adds an extra layer of security to your account. It’s like having a security guard protecting your front door. Even though you have the key, you still need to let the guard check who you are before you can enter the building.
  1. Talk to us about your business requirements
  2. Get strategic and creative advice 
  3. Discuss custom technical solution
  4. Contact us