Let's Connect
Our Vision

 Learn about our company and our
 customer-first philosophy

 
Meet the Team

 Put a face to the name and learn
 more about our team

    Contact Us

     Get in touch to learn more about
     our partner services

     

    Industries We Serve

    We specialize in a variety of industries, which enables us to offer unique insights

      Company News

       Read the latest and greatest about what
       we've been up to

       
      Stay in the Know

       Join our newsletter to get our
       latest resources delivered to your inbox

            Case Studies

            See how we’ve helped businesses
            improve their communications

             
            Gartner Reports

            See the latest rankings and reports
            for the Gartner Magic Quadrant in
            UCaaS and CCaaS

              Whitepapers & Ebooks

              Visit our growing library of resources about cloud and the customer journey

               

              Blog

              Enjoy reading our frequent articles
              written by us for you

                On-Demand Interviews & Events

                If you've missed a recent webinar or event, no problem, access them here

                 

                Join our Newsletter

                We'll make sure you receive our recent
                posts and resources directly to your inbox

                  4 min read

                  4 Phishing Scams Your Employees Should Be Aware Of

                  4 Phishing Scams Your Employees Should Be Aware Of

                  You may enjoy an occasional day of fishing on the lake, but the phishing we’re talking about today isn’t nearly as fun. Similar to regular fishing, phishing involves the use of bait to draw in unsuspecting users for nefarious purposes. Cyber criminals use various phishing techniques, usually through email, to convince users to reveal sensitive information that should never be shared.  

                  In this article we will share examples of some common phishing techniques used that can infiltrate your business email system and makes its way to unsuspecting users who aren’t trained to keep an eye out for these types of attacks.  

                  Especially as more employees are working from home, and sometimes required to use their personal computers, it’s important that they understand the value of recognizing a suspicious email and take the appropriate actions. 

                  Generally speaking, there are three ways that hackers use to phish for data. One method is to include an attachment in an email that, once opened, scours your computer to collect information. Another tactic is to place a link in the email that will lead you to a dodgy website.

                  Many people are fooled by this method into thinking that they are viewing the website of a legitimate business, such as a financial institution. And thirdly, the email may request that you reply with confidential information. Every user should be educated and warned about these potential threats. Here are some real-life examples: 

                  Financial Institutions Do Not Solicit Information Through Email 

                  Example: PayPal 

                  The website phishing.org offers a variety of resources for combatting the phishing hack. One of the examples they give is shown in the screenshot below. The sender of the email is hoping that the user will think it’s actually coming from the money transfer company PayPal. As the saying goes, looks can be deceiving. While it appears to be official, there are some clues that will help the wary user to avoid the phishing trap.  

                  Here are some tips:  

                  • Knowing the proper URL of the company in question is important. Any emails from PayPal should come from the first-level domain paypal.com.  

                  • Take a closer look at the email address of the sender, and if the URL shows anything else, take that as a red flag.  

                  • You can also hover over the link in the email body without clicking on it. This will give you the URL destination that you’re asked to visit. If any of these seems questionable to you, don’t click. Better safe than sorry! 

                  Users should also be aware that legitimate financial institutions generally do not solicit information through emails. If you were not expecting an email from the company, such as a response to your request for a password change, be very careful before taking any action. 

                  PAYPAL 1

                   

                  Low Resolution Images and Refund Claims 

                  Example: IRS Tax Refund 

                  The security company Norton offers further insight into the illicit practice of phishing. One of the examples they provide concerns an email purporting to have identified a refund that you are due from the IRS. Norton offers the tip that sometimes these emails come through with a low-resolution logo.  

                  TAX REF 1

                   

                  Poor Grammar and Spelling in Emails Is a Strong Key 

                  Example: SunTrust 

                  Another dead giveaway is when you see poor grammar or spelling in the email. In this example from Norton, any educated reader would notice the poor grammar in the first paragraph. These phishing attacks often originate from countries where English is not the first language. Sometimes it’s quite obvious at first glance that the email is fake, but be sure to read carefully before taking any action. And when in doubt, don’t! 

                  SUNTRUST 1

                   

                  Avoid Unknown Attachments, Even from Social Media Channels 

                  Example: Facebook Messenger 

                  The phishing exploit is not limited to email, however. Take a look at the screenshot below. It seems that clever hackers are busy on social media as well. Somehow they are even able to hack a friend’s account and send an attachment in the Facebook Messenger app. Users should be extremely careful about opening attachments on social media. Some Facebook users avoid Messenger for that very reason.  

                  PHISH 1

                   

                  Phishing Scams to Look Out For

                  Cyber attackers may pretend to be a financial institution, as shown above. But users should be on guard against other possible ploys that phishing hackers may use. Another method is to present an offer of money to get the user to reply with contact or financial information. We’ve all heard of the old “Nigerian Prince” scam. Don’t fall for it. If it sounds too good to be true, it probably is. 

                  Other Examples Common in the Workplace 

                  You should also watch for emails from someone pretending to be your boss, or a colleague asking for your login. Always double check the sender’s email address if the email seems to come out of the blue. And if you really want to know the truth, you can give that person a call to verify that the email is really from them. 

                  It's also common to get emails that sound as if an invoice is waiting for your approval, or is past due. Unless you are in billing and are expecting the email, report it to your IT Admin. 

                  And yet another tactic used by hackers is to pose as charity organizations. The FCC warns citizens to be especially on the alert after disasters such as major storms. They gave these general tips on their website: 

                  • Donate to trusted, well-known charities. 

                  • Verify all phone numbers for charities. 

                  • Do not open suspicious emails. 

                  • Verify information in social media posts. 

                  Impact of Phishing on Businesses

                  Phishing can be devastating to your business. According to Check Point, the security software company, the average successful phishing scam can cost a company $7.9 million. They also cite a Verizon 2019 Data Breach Investigations Report that says phishing attacks make up 32% of all security breaches.

                  The truth is that careless actions of a single employee can make an entire confidential database open to an attacker. (In 2016, for instance, a presidential campaign manager clicked on a link and exposed all his emails—quite an embarrassment!) It just takes one person to unwittingly share login information to a hacker, that can bring down the whole company.  

                  Conclusion

                  IT admins have a lot of responsibility, but they should also advise the users they support of theirs. One weak link can break the chain. Each user should become aware of potential phishing scams and how to avoid them. Perhaps the best thing to remember is that you can never be too careful.

                  Hackers are looking for any opportunity to compromise your IT systems, and the internet is full of stories where individuals have caused organizations a lot of grief. Constant vigilance is the key, but taking the bait from a phishing attacker can lead to disaster. Be alert. 

                  Contact us to learn more about how you can strengthen your security and see what other professional IT services we offer.

                  If you enjoyed this article you may also enjoy:

                  Mitel MiVoice Connect End of Life is Here

                  Mitel MiVoice Connect End of Life is Here

                  **This article has been updated on 10/10/2024 to include new information and dates provided by Mitel. The end isn't just near; it's here. Mitel...

                  Read More
                  8x8 Partners With Genesys CX for Better Collaboration

                  8x8 Partners With Genesys CX for Better Collaboration

                  Genesys and8x8are working together to create a product integration that combines the power of 8x8 Work and Genesys Cloud CX. It enables the premier

                  Read More
                  Bluetooth Headsets in the Contact Center

                  Bluetooth Headsets in the Contact Center

                  These days, themodern contact centerand Bluetooth headsets go together like oil and water; they will rarely be 100% compatible.

                  Read More
                  8 Tips to Protect Your Business From Email Threats

                  8 Tips to Protect Your Business From Email Threats

                  Stopping email threats such as ransomware and cryptomining is at the center of most everyone's radar these days.

                  Read More
                  Cyber-attacks Are on the Rise: How Prepared Are Your WFH Employees?

                  Cyber-attacks Are on the Rise: How Prepared Are Your WFH Employees?

                  Working from home is becoming increasingly common, unfortunately, so are cyber-attacks.

                  Read More
                  Is Your Business a Victim of App Overload?

                  Is Your Business a Victim of App Overload?

                  “There’s an app for that.” Everything seems to be app these days. Everything needs you to download and use an app: calls, email, team messaging,...

                  Read More