Blog Details

  • Home
  • Consulting
  • Do you know your phishing, from your vishing or smishing?

Do you know your phishing, from your vishing or smishing?

Do you know your phishing, from your vishing or smishing?

Lagos 10th September 2022:

Business Executives in Lagos are being warned about the ongoing dangers of phishing in their email – and other variants being targeted at them through other platforms.

Last year 83% of organizations reported experiencing phishing attacks – that’s up 28% from 2020. And it’s expected there will be an additional 6 billion attacks this year.

These stats have been examined by technology expert Paul, of Citrine Technologies Limited.

“In my experience, local business leaders have heard of phishing but don’t know the specifics,” he said.

“It’s called ‘phishing’ because cyber criminals bait unsuspecting victims into ‘biting’, in the same way, you’d lure a fish to a hook with a big maggot.

“This virtual bait is usually sent in an email. And when the victim gets hooked, their device and potentially their whole network can become infected with malware.

“Or the victim is enticed into giving away login credentials which can lead to data and even financial theft.”

There are many other forms of phishing, including:

  • Vishing: Like a phishing attack but done over the phone. Someone will call and pretend to be a person or company you know or a representative of them. They’ll ask you to take an action, such as giving them remote access to your device or visiting a website.
  • Pop-up phishing: Clues in the name. This is phishing via a pop-up. It may say there’s a problem with your device’s security and ask you to click a button to download a file or call a number to get it fixed.
  • Evil twin phishing: A fake Wi-Fi network is set up to look like the real deal. When you log in, the cybercriminal steals your data.
  • Angler phishing: Social media posts are created to encourage people to access an online account or click a link that downloads malware.
  • Smishing: Like a phishing email, but over SMS straight to your phone.
  • Spoofing: A website that’s created to look like the real thing, but isn’t. Once you log in, you’ve given away your credentials (spoofing can be used in conjunction with other forms of phishing attacks too).

Paul, added: “There are so many different ways cybercriminals target local businesses.

“The only protection that works is a blend of software to protect you and training for your staff. When staff knows about the red flags, they are much more likely to spot a scam before clicking a bad link.

“Your staff are the first line of your defense.”

Citrine Technologies Ltd was formed in 2016 and specializes in supporting businesses in Lagos.

Comments (2)

  • Obila Doe

    November 26, 2021 - 2:19 pm

    Our infrastructure management approach is holistic, addressing capacity monitoring, data storage, network utilisation, asset lifecycles, software patching, wired and wireless networking and more.

  • James Weighell

    November 26, 2021 - 2:21 pm

    A hosted desktop solution allows for the delivery of a consistent and scalable IT experience for all users in an organisation. With this solution, users gain access via a desktop icon or link.

Comments are closed.