Six tips to avoid phishing attacks

It is impossible to stop all attacks, but there are measures to minimize the risk of being infected

12 percent of users reading fraudulent emails, or ‘Phishin’ opens its attachments and gives access to your computer to cyber criminals. Check Point, the global provider specializing in security reports on increased offensives phishing in the last year. To prevent these attacks, the company offers six basic tips.

An attack of ‘phishing’ is basically an email created by a hacker . This email is virtually identical to legitimate would send a company to its customers or employees. Its main objective is to trick recipients into clicking on a link or file malicious attachment.They can also be oriented to obtain login credentials, allowing the thief break through the defenses of an enterprise and access networks, as explained from Check Point.

Seven out of ten companies have experienced an increase in attacks by fraudulent emails in the last twelve months. To prevent companies from being compromised by an offensive this, Check Point offers six basic tips:


1. Take note of the message sender . Most phishing attacks’ comes from strangers. Before opening any message, the user must see where. Special attention also should be paid if there is something strange in the direction, as an ‘o’ where there should be a zero, or poorly sorted letters (Amaozn instead of Amazon, for example).

2. Look who sent the message . Another aspect to consider is to check how many people have received the same message. If they are not known, it is best not to open it. An attack of phishing targets large groups of people at once, so if an ’email’ has many recipients, it is recommended to remove it .

3. Consistency in the matter. The messages reach the inbox of a corporate email should be related to the activity at work. An email with a subject that does not correspond to the functions of a worker, or a response to a message that not even sent first, is very likely to contain ‘malware’. Or, in the best case scenario, ‘spam’.

4. Analyze the sending time. Is there in your input tray messages not correspond to the normal schedule for your work? Today many companies are working with teams from different countries, but it is relatively easy to identify ’emails’ that are not the usual.

5. Be wary of attachments and hyperlinks strange. Most attacks phishing links and attachments include fraudulent. They are the gateway through which hackers gain access to networks and equipment companies. Check Point recommends delete without even opening them.

6. Contents alarming. Urgent emails that require immediate action by the user are often phishing attacks. ” For example, if a message that looks like the bank, it is best to call the branch to ensure that the ’email’ is legitimate.

It is impossible to stop all attacks phishing, but you can take this series of measures to minimize the risk of being infected. In case of doubt, it is best not to open the message, and whether it has already done, not click on the link or download the attachment, and alert the IT department.


Leave a Reply

Your email address will not be published. Required fields are marked *