{"id":710,"date":"2021-10-21T15:04:08","date_gmt":"2021-10-21T20:04:08","guid":{"rendered":"https:\/\/cmitsolutions.com\/boston-ma-1089\/?p=710"},"modified":"2023-03-23T23:25:11","modified_gmt":"2023-03-24T04:25:11","slug":"how-to-catch-phishing-red-flags-2","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/boston-ma-1089\/blog\/how-to-catch-phishing-red-flags-2\/","title":{"rendered":"How to Catch Phishing Red Flags"},"content":{"rendered":"<p>&nbsp;<\/p>\n<h1><strong>How To Catch Phishing Red Flags<\/strong><\/h1>\n<p>Phishing attacks and scams have thrived since the COVID pandemic began in 2020 and today, phishing attacks account for more than <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/2019-data-breach-investigations-report.pdf\"><span style=\"color: #000080;\">80 percent of reported security incidents<\/span><\/a>. Week 2 of Cybersecurity \u00a0Awareness Month stresses the importance of being wary of phishing emails, text messages or chat boxes that come from a stranger or someone you were not expecting. Luckily there are phishing red flags you can catch if you stay diligent.<\/p>\n<p>Despite often being overlooked in terms of hype, phishing has been a mainstay in the cybersecurity threat landscape for decades. In fact,<span style=\"color: #000080;\"> <a style=\"color: #000080;\" href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">43 percent<\/a> <\/span>of cyberattacks in 2020 featured phishing or pre-texting, while<span style=\"color: #000080;\"> <a style=\"color: #000080;\" href=\"https:\/\/www.proofpoint.com\/us\/resources\/threat-reports\/state-of-phish\">74 percent<\/a> <\/span>of US organizations experienced a successful phishing attack last year alone. That means that phishing is one of the most dangerous \u201caction varieties\u201d to an organization\u2019s cybersecurity health. As a result, the need for proper anti-phishing hygiene and best practices is an absolute must.<\/p>\n<p>With that in mind, here are the red flags and best practice tips for dealing with phishing threats.<\/p>\n<h3><strong>What Are The Red Flags?<\/strong><\/h3>\n<p>Phishes are masters of making their content and interactions appealing. From content design to language, it can be difficult to discern whether content is genuine or a potential threat, which is why it is so important to know the red flags.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-712\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog1-Urgent-or-Threatening-Language-1024x171-1-300x50.png\" alt=\"\" width=\"1008\" height=\"168\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog1-Urgent-or-Threatening-Language-1024x171-1-300x50.png 300w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog1-Urgent-or-Threatening-Language-1024x171-1-768x128.png 768w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog1-Urgent-or-Threatening-Language-1024x171-1.png 1024w\" sizes=\"(max-width: 1008px) 100vw, 1008px\" \/><\/p>\n<p><strong><span style=\"color: #ff0000;\">URGENT OR THREATENING LANGUAGE<\/span> \u00a0&#8211; <\/strong>Any messaging that creates a sense of urgency or threatening language meant to trigger you into taking immediate action is a phishing red flag that the content you received could be from a phish and should be handled with caution.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-713\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog2-Spelling-and-Grammar-Mistakes-1024x171-1-300x50.png\" alt=\"\" width=\"1002\" height=\"167\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog2-Spelling-and-Grammar-Mistakes-1024x171-1-300x50.png 300w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog2-Spelling-and-Grammar-Mistakes-1024x171-1-768x128.png 768w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog2-Spelling-and-Grammar-Mistakes-1024x171-1.png 1024w\" sizes=\"(max-width: 1002px) 100vw, 1002px\" \/><\/p>\n<p><strong><span style=\"color: #ff0000;\">SPELLING AND GRAMMAR MISTAKES<\/span> &#8211; <\/strong>Look closely! If there are spelling errors and poor grammar usage, it is typically a sign of a phishing attempt. Trickier mistakes that may be harder to spot are when zeros (0\u2019s) will be in place of O\u2019s.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-714\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog3-Awkward-and-Unusual-Formatting-1024x171-1-300x50.png\" alt=\"\" width=\"996\" height=\"166\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog3-Awkward-and-Unusual-Formatting-1024x171-1-300x50.png 300w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog3-Awkward-and-Unusual-Formatting-1024x171-1-768x128.png 768w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog3-Awkward-and-Unusual-Formatting-1024x171-1.png 1024w\" sizes=\"(max-width: 996px) 100vw, 996px\" \/><\/p>\n<p><strong><span style=\"color: #ff0000;\">AWKWARD AND UNUSUAL FORMATTING<\/span> &#8211; <\/strong>Does the spacing looks off to you? If the formatting is out of whack it, follow your intuition that something is wrong and be prepared to flag the message.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-715\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog4-Requests-for-Money-or-Personal-Info-1024x171-1-300x50.png\" alt=\"\" width=\"1026\" height=\"171\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog4-Requests-for-Money-or-Personal-Info-1024x171-1-300x50.png 300w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog4-Requests-for-Money-or-Personal-Info-1024x171-1-768x128.png 768w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog4-Requests-for-Money-or-Personal-Info-1024x171-1.png 1024w\" sizes=\"(max-width: 1026px) 100vw, 1026px\" \/><\/p>\n<p><strong><span style=\"color: #ff0000;\">REQUESTS FOR MONEY OR PERSONAL INFO<\/span> &#8211; <\/strong>This phishing red flag can come in various forms and is not always easy to spot. Any messaging or social media posts requesting you to share your personal information \u2013 no matter how seemingly harmless \u2013 is a phishing attempt to expose your password information. Be extra wary of anything asking for information typically asked on verification sites. Such as your street name, high school name, favorite foods, etc.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-716\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog5-Explicit-Calls-To-Action-1024x171-1-300x50.png\" alt=\"\" width=\"1248\" height=\"208\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog5-Explicit-Calls-To-Action-1024x171-1-300x50.png 300w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog5-Explicit-Calls-To-Action-1024x171-1-768x128.png 768w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Blog5-Explicit-Calls-To-Action-1024x171-1.png 1024w\" sizes=\"(max-width: 1248px) 100vw, 1248px\" \/><\/p>\n<p><strong><span style=\"color: #ff0000;\">OVERLY EXPLICIT CALLS TO ACTION<\/span> &#8211; <\/strong>Most phishing attempts exploit urgency and trick you into clicking on a compromised link or attachment. Think before you blindly click!<\/p>\n<h3><strong>Verify The Source<\/strong><\/h3>\n<p>Is the message really who it says it is from? \u00a0Many phishes will try to impersonate someone you may already know &#8212; such as a colleague, service provider or friend &#8212; as a way to trick you into believing their malicious content is actually trustworthy. Don\u2019t fall for it. If you sense any red flags above that something may be out of place or unusual, reach out directly to the individual to confirm whether the content is authentic and safe. If not, break-off communication immediately and report the incident through the proper channels.<\/p>\n<h3><strong>Be Aware of Vishing and Other Phishing Offshoots<\/strong><\/h3>\n<p>As more digital natives have come online and greater awareness has been spread about phishing, bad actors have begun to diversify their phishing efforts beyond traditional email. For example, <a title=\"Don\u2019t Get Hooked: Phishing, Vishing &amp; Smishing\" href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/dont-get-hooked-phishing-vishing-smishing\/\"><span style=\"color: #000080;\">voice phishing &#8212; or vishing<\/span><\/a> &#8212; has become a primary alternative for bad actors looking to gain sensitive information from unsuspecting individuals. Similar to conventional phishing, vishing is typically executed by individuals posing as a legitimate organization &#8212; such as a healthcare provider or insurer &#8212; and asking for sensitive information. Simply put, it is imperative that individuals be wary of any sort of communication that asks for personal information whether it be via email, phone or chat &#8212; especially if the communication is unexpected. If anything seems suspicious, again, break-off the interaction immediately and contact the company directly to confirm the veracity of the communications.<\/p>\n<h3><strong>Fight The Phish<\/strong><\/h3>\n<p>Phishing may be \u201cone of the oldest tricks in the book,\u201d but it is still incredibly effective. And although it may be hard to spot when you may be in the midst of a phishing attempt, by exercising caution and deploying these few fundamentals, individuals and organizations more broadly can drastically mitigate the chances of falling victim to a phishing attack.<\/p>\n<p>Stay tuned each week in October as we\u2019ll post a new blog for Cybersecurity Awareness Month.<\/p>\n<p>Written by: <a title=\"About\" href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/about\/\"><span style=\"color: #000080;\">Chris Zambuto<\/span><\/a> | Chief Information Security Officer <span style=\"color: #000080;\"><a style=\"color: #000080;\" href=\"https:\/\/www.facebook.com\/CMITBostonCambridge\/\">@<\/a><\/span><a href=\"https:\/\/www.facebook.com\/CMITBostonCambridge\/\"><span style=\"color: #000080;\">CMITBostonCambridge<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; How To Catch Phishing Red Flags Phishing attacks and scams have&#8230;<\/p>\n","protected":false},"author":259,"featured_media":711,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-710","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blog"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/posts\/710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/comments?post=710"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/posts\/710\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/media\/711"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/media?parent=710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/categories?post=710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/tags?post=710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}