Sign up to V-Hub

Do you need help with something?

Share this article

Tips to protect your business from cybercrime

Articles
20 Jul 2021
Save

Simple tips for protecting your business against cyber-crime

As a business, it can be challenging to keep your cybersecurity systems up to date as fraudsters and thieves quickly adapt and exploit new protection methods.

Of the many malicious attempts, phishing is one of the most dangerous and most common threats, since it preys on human error.

It involves a cyber-criminal sending an automated email or message to a large number of recipients, disguised as:

  • a trusted person or institution

  • a colleague asking for sensitive information such as bank account number, ID card number and passwords

  • a seemingly trustworthy link

After clicking the link, the cyber-criminal can search for information and use it to steal money or blackmail the individual.

‘Spear Fishing’ messages are more targeted and customised, with the cyber-criminal pretending to be a close relative, friend or partner. These are usually delivered via email, social media or dating sites.

As remote working increases, more and more of us are using our personal mobiles for work, which has led to a rise in phishing attacks. In fact, the number of mobile phishing attacks has increased by 32% from Q4 2019 to Q1 2020.

That’s why it’s important to educate your employees about the possible threats so they can recognise an attack when it happens.

There are five common types of mobile phishing attacks:

1. URL padding: when the real destination of the website is hidden by hyphens, leaving only the seemingly legitimate site visible.

1.2_01_desktop

2. Tiny URLs are shortened links that lead the user to malicious content. It’s also possible to send these via SMS.

1.2_02_desktop

3. Screen overlays replicate the login page of a legitimate mobile app in order to obtain a person’s username and password. This method is very effective and usually targets mobile banking and payment apps.

1.2_03_desktop

4. Mobile verification can help the attacker verify that the target is a mobile device and send specific attacks to it.

1.2_04_desktop

5. ‘SMS spoofing’ tricks the user to click a link by disguising themselves as a system update notification. When the user clicks on it, it intercepts emails, sensitive data or web traffic to and from the device.

1.2_05_desktop

Test your ability to spot phishing with this real vs. fake mobile phishing test by Lookout.

To learn more about how to keep your business protected from cyber-attacks consult an expert by calling or requesting a call back.

This article was created by Hank Schless, Senior Product Marketing Manager at Lookout, in partnership with Vodafone Business. Sources https://cybersecurity.att.com/blogs/security-essentials/mobile-phishing https://threatpost.com/enterprise-mobile-phishing-pandemic/156236/

Thanks for your feedback!

More news and insights