[{"@context":"https:\/\/schema.org\/","@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/cyber-scam-wrap-up\/#BlogPosting","mainEntityOfPage":"https:\/\/univista.com\/posts\/cyber-scam-wrap-up\/","headline":"Cyber Scam Wrap Up","name":"Cyber Scam Wrap Up","description":"ShareTweet In previous editions, we discussed the various forms of Phishing Attacks ( https:\/\/univista.com\/posts\/when-in-doubt-throw-it-out-e-g-delete-move-to-trash\/ ) cybercriminals employ to take advantage of individuals and situations.\u00a0 These include: Phishing Emails, Spear Phishing, Whaling Emails, Vishing\/Smishing, Angler Phishing.\u00a0 For a review of these techniques, please click the link above. We frequently highlight new scams on UniVista\u2019s Corporate Facebook [&hellip;]","datePublished":"2022-09-01","dateModified":"2022-09-01","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/kasha-ford\/#Person","name":"Kasha Ford","url":"https:\/\/univista.com\/posts\/author\/kasha-ford\/","identifier":10,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/33eaeba24c23d4bf81db53e38627da1da0c1604cefd8066b39afba2a7b297c69?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/33eaeba24c23d4bf81db53e38627da1da0c1604cefd8066b39afba2a7b297c69?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","height":"265","width":"631"},"url":"https:\/\/univista.com\/posts\/cyber-scam-wrap-up\/","about":["Uncategorized"],"wordCount":548,"articleBody":"ShareTweet                                        In previous editions, we discussed the various forms of Phishing Attacks ( https:\/\/univista.com\/posts\/when-in-doubt-throw-it-out-e-g-delete-move-to-trash\/ ) cybercriminals employ to take advantage of individuals and situations.\u00a0 These include: Phishing Emails, Spear Phishing, Whaling Emails, Vishing\/Smishing, Angler Phishing.\u00a0 For a review of these techniques, please click the link above.We frequently highlight new scams on UniVista\u2019s Corporate Facebook page.\u00a0 If you haven\u2019t taken the opportunity to \u201cFollow UniVista\u201d at https:\/\/www.facebook.com\/weareunivista, we highly encourage you to do so.We wanted to wrap up this segment on cybersecurity scams with an easy to remember tip.\u00a0 Firstly, human-error is the weakest link for cybercriminals.\u00a0 Avoid just \u201cclicking on things\u201d. It\u2019s always important to be on guard. You\u2019re more vulnerable when you\u2019re tired, frazzled, or distracted by work.\u00a0 It\u2019s times like these that we need to be most vigilant.Volume and Credible Looking Attempts \u2013 Don\u2019t take the bait!Cybercriminals will send texts and emails with phony links that can not only cause a data breach but can also have many significant financial and legal consequences.\u00a0 One technique is Prompt Bombing; in this scenario a message is sent multiple times, with a simple somewhat familiar clickthrough link, for example, from your bank, Amazon, eBay, etc.\u00a0 Cybercriminals repeatedly send these malicious links with the hopes that if you receive something multiple times, and it looks somewhat familiar, you will just naively click on it to make it go away.\u00a0 This scam is often done very late at night when an individual is likely tired, not at their peak performance and\/or is awoken by their phone dinging on their nightstand, generally when their guard is down.\u00a0 A good way to prevent this is to simply keep your phone in another room and\/or turn certain notifications off, or put your phone on \u201cdo not disturb\u201d mode at bedtime.Another popular scam that also is used by the aforementioned \u201cPrompt Bombing\u201d scenario, is Impersonating Credible Sources.\u00a0 In this scenario an email or text is sent from a \u201ctrusted source\u201d that has very similar looking url\u2019s to the original to click on.\u00a0 These often mimic your credit or banking institutions, Amazon, Microsoft, etc.\u00a0 Names that seem fine at first glance, but are just not quite right: \u201cFaceboock\u201d, \u201cMicros0ft\u201d, \u201cWells Fargoo\u201d, etc. Usually, these are pretty easy to spot \u2013 unless you\u2019re distracted and reading through things quickly. \u00a0The malicious link provided takes an unsuspecting victim to a \u201cfake page\u201d that resembles that institution\u2019s\/organization\u2019s real page.\u00a0 Often the fake page attempts to obtain the victims information, like passwords and account numbers, to gain access with later.The ability to multitask isn&#8217;t always a good thing. Think before you click.Multi-tasking Pitfalls.Again, human error is typically an organization\u2019s weakest link.\u00a0 Unfortunately, individuals fall victim to these scams when they are distracted and trying to multi-task.\u00a0 It\u2019s best to make it a personal policy to never review or act upon these types of emails when you are busy doing other things.If you have any questions on cybersecurity or how to keep your organization safe, please don\u2019t hesitate to contact UniVista.\u00a0 Additionally, for those of you who have a UniVista Support Agreement, we offer regular cybersecurity training.ShareTweet                                        "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Posts","item":"https:\/\/univista.com\/posts\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"Cyber Scam Wrap Up","item":"https:\/\/univista.com\/posts\/cyber-scam-wrap-up\/#breadcrumbitem"}]}]