{"id":11347,"date":"2017-05-22T09:00:27","date_gmt":"2017-05-22T14:00:27","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=11347"},"modified":"2017-05-24T15:40:12","modified_gmt":"2017-05-24T20:40:12","slug":"5-things-can-prevent-phishing-scams-work","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/5-things-can-prevent-phishing-scams-work\/","title":{"rendered":"5 Things You Can Do to Prevent Phishing Scams at Work"},"content":{"rendered":"<p><a href=\"http:\/\/www.ibtimes.com\/phishing-scams-fbi-says-businesses-have-lost-5-billion-phishing-social-engineering-2536205\"><span style=\"font-weight: 400;\">Phishing attacks on businesses<\/span><\/a><span style=\"font-weight: 400;\"> are on the rise: the FBI reports that businesses worldwide have lost more than $5 billion over the last several years because of this trend. Hackers are typically able to gain access to a business\u2019 computer system through their employees, by targeting individuals with social engineering scams through phishing or by collecting personal information from their social media profiles. You can use the Anti-Hacking feature to block phishing attempts on your work phone:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/safe_navigation\" rel=\"attachment wp-att-11173\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-11173\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/05\/Deeplink_Activate-Anti-Hacking-300x60.png\" alt=\"Deeplink_Activate-Anti-Hacking\" width=\"300\" height=\"60\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/05\/Deeplink_Activate-Anti-Hacking-300x60.png 300w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/05\/Deeplink_Activate-Anti-Hacking.png 392w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><span style=\"font-weight: 400;\">Anti-Hacking will block you from malicious websites and warn you of deceptive websites. It\u2019s important to stay protected from scams across devices since you\u2019ll likely check emails throughout the day on your work or personal phone. After all, you don\u2019t want to be the weak link at your company \u2014 the individual whose oversight leads to a company-wide breach. The following are additional ways you can protect yourself from phishing scams at work.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/protect-social-engineering-attacks\/\"><b>How to Protect Yourself from Social Engineering Attacks<\/b><\/a><\/p>\n<ol>\n<li><b> Follow the Strong Passwords and Use Two-Factor Authentication Rule<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Your IT department will prompt you to create strong passwords and use two-factor authentication for your professional accounts. Don\u2019t ignore this request, as this is how many companies are breached &#8212; employees who ignore this or put it on a to-do list but don\u2019t follow through. Strong passwords are long passwords with lowercase and uppercase letters, symbols, and numbers. Also, apply the same rule to your personal accounts.<\/span><\/p>\n<ol start=\"2\">\n<li><b> Be Wary of What You Send Via Email<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Email is not a secure form of communication for many reasons, one being that it\u2019s easy to intercept emails. Don\u2019t send any personal information via email or email forms (such as passwords or your Social Security number).<\/span><\/p>\n<ol start=\"3\">\n<li><b> Be Suspicious of Unsolicited Emails and Phone Calls<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Some unsolicited emails and phone calls are legitimate \u2014 but many are not. Many phishing scams are designed to prey on your emotions, and get you to respond with personal information or click on a link out of fear. This approach works, too: it is often most successful when the targeted individual is experiencing personal trouble or hardship, which the hacker can gather from stalking the victim\u2019s social media profiles.<\/span><\/p>\n<ol start=\"4\">\n<li><b> Be Skeptical of Emails From Trusted Sources<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">You should be skeptical of all emails you receive \u2014 even if they\u2019re seemingly from a friend, coworker, or your bank. Phishing scams are getting cleverer by the day, and many scammers are able to spoof emails from people you know or else compromise a known, trusted email address. If the language in the email feels \u201coff\u201d or strange \u2014 and if that language is accompanied by a link, attachment, or a request for personal information \u2014 ask yourself if the email seems legitimate. If you have doubts, reach out to the sender by another form of communication and ask if they sent the email. If you\u2019re at work, alert your IT support department right away.<\/span><\/p>\n<ol start=\"5\">\n<li><b> Don\u2019t Mix Business With Pleasure<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Be cautious about what you post on social media, especially when it comes to information related to your job. Hackers are more frequently targeting employees\u2019 social media profiles in order to collect personal information that could provide answers to job-related security questions or passwords.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the last few years, phishing attacks on businesses have skyrocketed \u2014 largely due to cyber attacks on employees. Find out how to prevent scams at work.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[301,303,308,312,149,4400,249],"class_list":["post-11347","post","type-post","status-publish","format-standard","hentry","category-security","tag-app2","tag-app3","tag-app6","tag-app8","tag-phishing","tag-scams","tag-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/11347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=11347"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/11347\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=11347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=11347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=11347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}