Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Shielding Yourself from Phishing - Identifying and Dodging Typical Schemes

Published 10/01/2024

Shielding Yourself from Phishing - Identifying and Dodging Typical Schemes

Written by Abel E. Molina, Softchoice.


"Those who fail to learn from history are condemned to repeat it." - W. Churchill

The above quote feels especially pertinent in cybersecurity, where gleaning lessons from prior breaches strengthens our future defenses. With Cybersecurity Month upon us, there's no better time to delve into the age-old menace of Phishing Scams. These cunning cyber villains use deceptive tricks to steal sensitive information, causing significant financial and personal distress. In this blog, we'll explore common phishing schemes, offer tips for spotting them, and share strategies to safeguard yourself.

Let’s dig in….


Understanding Phishing

Phishing is a cybercrime where attackers pose as legitimate entities to steal sensitive data like usernames, passwords, and credit card details. These communications often appear authentic, making vigilance essential.


Common Phishing Tactics

  • Email Phishing: The most common form, where attackers send emails from seemingly reputable sources, urging recipients to click malicious links or share personal information. Example: An email from "your bank" about suspicious activity, directing you to a fake website.
  • Spear Phishing: Targeted attacks using personal information to craft convincing messages. Example: An email addressing you by name, referencing a recent purchase, and asking you to click a link.
  • Whaling: High-profile targets like executives; attacks are highly personalized. Example: An email from a "fellow executive" about a confidential business deal.
  • Smishing and Vishing: Phishing via SMS (smishing) or voice calls (vishing). Example: A text from "your mobile carrier" about an unpaid bill, leading to a phishing site.
  • Clone Phishing: Nearly identical copies of legitimate emails with malicious links or attachments. Example: An email resending a previously received attachment, now containing malware.


Recognizing Phishing Attempts

  • Suspicious Sender Address: Check for discrepancies or unusual domains.
  • Generic Greetings: Be wary of "Dear Customer" instead of your name.
  • Urgent Language: Phishing emails often create a sense of urgency.
  • Spelling and Grammar Errors: Many phishing emails contain mistakes.
  • Unsolicited Attachments or Links: Avoid clicking on unexpected links or attachments.
  • Requests for Personal Information: Legitimate organizations typically don't ask for sensitive info via email.


Preventing Phishing Scams

  • Verify the Source: Confirm emails' authenticity by contacting organizations directly.
  • Hover Over Links: Check the actual URL before clicking.
  • Use Security Software: Ensure devices have up-to-date security software.
  • Enable Two-Factor Authentication (2FA): Adds an extra layer of security.
  • Educate Yourself and Others: Stay informed about phishing tactics and share knowledge.


Real-Life Examples

  • Google Docs Phishing Scam (2017): Targeted Google users with emails inviting them to collaborate on a document, leading to a fake login page.
  • PayPal Phishing Scam (2020): Targeted PayPal users with emails about account limitations due to suspicious activity, leading to a fake login page.


Reporting Suspicious Emails

  • Forward the Email: Forward to the organization being impersonated. Most have dedicated reporting addresses (e.g., [email protected]).
  • Report to Your Email Provider: Mark the email as phishing in your client (e.g., Gmail, Outlook).
  • Use Reporting Tools: Report to anti-phishing organizations like the Anti-Phishing Working Group (APWG) at [email protected].
  • Inform Your IT Department: If at work, report to your IT department.

Phishing is a constant threat, but staying informed and vigilant can reduce the risk. Always verify communications' authenticity, use security measures, and report suspicious emails. Going back to the wisdom of Sir Winston Churchill, he once said, "Danger - if you meet it promptly and without flinching - you will reduce the danger by half. Never run away from anything. Never!" Stay safe and cyber-aware!



About the Authorauthor headshot

Abel E. Molina is a Principal Architect in Design Studio at Softchoice. He has over 19 years of experience in the IT industry, specializing in security, cloud, hybrid, and server solutions. He has worked in several roles as an IT consultant engineer, a security engineer, a solutions architect, and a subject matter expert for Microsoft. His dedication to security and zero trust principles has made him an invaluable asset to major enterprises across North America as they transition and implement zero trust frameworks.


Share this content on your favorite social network today!