Most hackers don't try to steal your data ... they try to trick you into giving it up willingly. How does this affect businesses?
Here's a better question—what do cybercriminals really do? The answer may shock you.
Aren't hackers as devious IT wizards, scouring code to find chinks in firewalls, crack encryptions, and penetrate formidable security measures?
Not entirely. Proper cybersecurity is actually very strong and getting stronger every year. Most hackers don't even try.
Instead, data thieves try to hack you.
Their target is not vulnerabilities in data security, but vulnerabilities in human psychology. 90% of all successful data breaches start with the embarrassingly low-tech tactic we call "Phishing."
Phishing is the most popular form of "social engineering," cybercriminal vernacular for a confidence scam.
Acquiring its signature spelling from early hackers who called themselves "phreaks," phishing is what it sounds like — casting a scam far and wide and seeing who falls for it, who "bites."
In its most simple form, phishing involves a mass email that attempts to dupe the recipient into clicking a link to a malware download or replying with personal data like their social security number, password, or credit card info.
Contact 360 Smart Networks for examples of real phishing emails.
Versions have also evolved to target SMS (text message) inboxes ("smishing") and phone calls or voice mail ("vishing").
More targeted scams, where the phisher includes personal details to make the ruse more believable, are called "spear phishing."
In most cases, the phisher builds trust by posing as a trustworthy source. For example:
Some of the most cataclysmic data breaches of the last decade started with humble phishing, including:
In 2017, 76% of companies were targeted with phishing attacks, 67% of the attacks aimed at low-level employees. Microsoft reported a 250% increase in phishing in the subsequent year.
60% of all companies that suffer a major data breach close their doors permanently within six months.
Be on the lookout for the following telltale signs of a phishing message:
Reach out to 360 Smart Networks for more tips to guard against Phishing.