Client Service Login
Latest News & Events
This tournament is scheduled to be held Friday, June 10, 2022. The past six years have all been sold-out and this year is shaping up to be another one for the books you won't want to miss.
As serious as they are, cyberattacks are not always labeled with the most serious-sounding names. We are, of course, talking about phishing: the use of spoofed email addresses and fraudulent messages to get hold of data, or whatever goal the attacker has in mind. One of the silliest-sounding versions of phishing—smishing—has proven to be of particular risk.
When cybercriminals use phishing scams, they aren’t using advanced technologies to crack their target’s digital defenses. Instead, they hack users by exploiting the assumptions, bad habits, and ignorance of the target to get them to release sensitive information.
Attackers circumvent cybersecurity measures by sending messages purporting to be from an authority figure or trusted contact, thereby convincing the user to undermine their protection. A notorious example of phishing is the email from the persecuted royal family, known as the "Nigerian Prince scam."
Smishing simply applies this principle to SMS instead of the usual email.
You could simply receive an SMS from a number that claims to be a financial institution or service provider, or even if you are doing business with that institution.
This message could contain details that confirm that the sender is who they purport to be, or it could go unnoticed because it is not the kind of message that most people expect to be phished through. More recently, many of these attacks have been sent under the ruse of being from authorities trying to share information about the COVID-19 pandemic.
There is a possibility that a link may be included in the message asking you to log in, but the problem is that this will lead you back to a fraudulent login page where the user’s actual login data is collected. It may prompt you to download a document that hides a variety of malicious programs, and suddenly the attacker has access to all your personal information, such as your phone number, email address, credit card numbers, bank account credentials and other sensitive information.
It's as simple as that.
Now, think for a moment about how much sensitive data you're likely to keep on your phones and what data a hacker might extract from them.
To prevent this from affecting your business, your entire team must be able to detect phishing attempts as soon as they are sent via SMS.
As a final tip, you need to make sure your entire organization keeps an eye on security during the workday and that they know how to identify and respond to threats.
Of course, it does not hurt to apply certain preventative measures to your network, such as anti-virus, firewall protections, and others. We can help! Dresner Group can support your team in its IT requirements for security, productivity, and mobility. Find out about our services by contacting (410) 531-6727.
When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.