Open Accessibility Menu
Hide

Phishing, Smishing, and Vishing: What You Need to Know to Protect Yourself

Phishing, Smishing, and Vishing: What You Need to Know to Protect Yourself

Phishing, smishing, and vishing are all types of social engineering attacks that are designed to trick you into revealing sensitive information, such as your credit card number, Social Security number, or password. These attacks can be very sophisticated, and it can be difficult to tell if you're being targeted.

Red Flags

What is Phishing?

Phishing is a type of social engineering attack that uses email to trick you into revealing sensitive information. The attacker will send you an email that looks like it's from a legitimate company, such as your bank or credit card company. The email will contain a link to a fake website that looks just like the real thing. If you click on the link and enter your login information, the attacker will be able to steal your account credentials. If you fall victim to a phishing attack, you could end up with a damaged reputation, lost money, or even a stolen identity.

Phishing Red Flags

What is Smishing?

Smishing is a type of social engineering attack that uses text messages to trick you into revealing sensitive information. The attacker will send you a text message that looks like it's from a legitimate company, such as your bank or credit card company. The text message will contain a link to a fake website that looks just like the real thing. If you click on the link and enter your login information, the attacker will be able to steal your account credentials.

Smishing & Vishing

What is Vishing?

Vishing is a type of social engineering attack that uses phone calls to trick you into revealing sensitive information. The attacker will call you and pretend to be from a legitimate company, such as your bank or credit card company. The attacker will ask you for your personal information, such as your credit card number or Social Security number. If you give them this information, the attacker will be able to steal your identity and use it to commit fraud.

20 Ways To Stop Mobile Attacks

How to Protect Yourself from Phishing, Smishing, and Vishing

There are a few things you can do to protect yourself from phishing, smishing, and vishing attacks:

  • Be suspicious of any email or text message that asks for your personal information. Legitimate companies will never ask for this information over email or text message.
  • Don't click on links in emails or text messages from unknown senders. Instead, go directly to the website of the company in question.
  • Be careful about what information you share on social media. This information can be used by attackers to target you with phishing attacks.
  • Use strong passwords and change them regularly. Do not use the same password for multiple accounts.
  • Use a security software that can detect and block phishing, smishing, and vishing attacks. Install and keep your antivirus software up to date. Antivirus software can help protect your computer from malware.
  • If you get a message from someone you know making a request of you contact them in another way to verify the message. For example, if they sent you an email you could call them or text them to verify the message is real. This will protect you from falling victim to an attacker who has control over their email account.
  • Enable two-factor authentication for your online accounts. This will add an extra layer of security to your accounts.

By following these tips, you can help protect yourself from these dangerous attacks.

Multifactor authentication banner

#HHCCYBERSECURITYAWARENESSMONTH
In a recent National Cybersecurity Alliance survey, 57% of respondents said they have heard of multifactor authentication (MFA), but many people don’t realize that multifactor authentication is an
incredibly important layer of protection in keeping accounts secure. This week, IT Security wants to show you how easy it is to turn on MFA whenever possible and why you should!
OUR TIPS AND ADVICE
MFA provides extra security by providing a secondary method confirming your identity when logging into accounts. MFA usually requires you to enter a code sent to your phone or email, or one generated by an authenticator app.
Push notifications are also common methods of MFA. This added step prevents unauthorized users from gaining access to you accounts, even if your password has been compromised.
WHERE SHOULD YOU USE MFA?
On accounts that offer MFA:
banks, credit cards, online stores
social media and email
USE MFA EVERYWHERE!
FOLLOW THESE STEPS TO TURN ON MFA
  • Open your app or account settings – It may be called Account Settings, Settings & Privacy of similar.
  • Turn on multifactor authentication – It may also be called two-factor authentication, two-step authentication, or similar.
  • Confirm – Select an MFA method to use from the options provided.
Examples are:
Receiving a code by text or email
Using an authenticator app: These phone-based apps generate a new code every 30 seconds or so.
Biometrics: This uses facial recognition or fingerprints to confirm your identity.
With MFA, you can stay one step ahead of the hacker!
Please visit the National Cybersecurity Alliance at https://staysafeonline.org/ for free resources and more information.