4 Ways Workplaces Can Block Phishing Attempts Around Orlando Shooting
When tragedy strikes, it can briefly bring people closer together. If something dramatic takes place, minor disagreements may go on the back burner, either at a local level or even an international level.
For instance, terrorist attacks in other parts of the world draw sympathy and foreign aid. Domestic attacks, such as the September 11 attacks, also brought a moment of unity while the world grieved. Locally, millions of dollars were raised for aid groups and charities.
Unfortunately, while some people’s hearts are moved, and they want to do more than simply pray for and think about the victims, some cybercriminals see people’s misfortune as a chance to take advantage of their generosity so they can line their own pockets.
That’s why two guys from Jersey City were able to take in more than $120,000 by claiming they were collecting money for 9/11 victims’ families. And that’s why millions in aid money was stolen, embezzled or simply misplaced by businesses, elected officials and individuals following Hurricane Katrina.
Today’s scammers are also getting more sophisticated, and they are trying to lure people where they spend most of their time — on their computers or mobile devices.
Experience has taught many of us that door-to-door or direct mail solicitations may be bogus. But that lesson hasn’t sunk in for people reading online offers — especially when something terrible has happened, and people collectively want to do more to help in any manner possible.
The recent Orlando shooting has caused a variety of off-line and online scams to pop up, everything from people seeking cash donations to charities that may not actually give much money to those they claim to support.
But what’s especially concerning are the more sophisticated attempts that resemble something legitimate, but they are actually phishing attempts that try to steal your personal information and perhaps gain access to your networks.
Both businesses and individuals can be susceptible to these types of scams; a well-meaning employee may click on a link, thinking that he or she is helping, but which actually introduces malware to the system.
Companies may not want to be in the position of telling employees not to help Orlando victims, but they also can encourage them to be cautious in their online activities. Suggestions include:
- Look at language: If an email offers to help victims of the attack in Florida, but reads as if it is written by someone for whom English is not their first language, it might be a clue that it’s bogus.
- Look at the recipient: A personal request for help from an actual person may have more legitimacy rather than a generic “Customer” or “Dear Friend” letter that may go out to thousands of emails. This is especially critical for spotting phishing emails that appear to have come from a site with which you’re familiar, or with whom you have an account.
- Avoid giving passwords. Even if an email or site appears to be legitimate, such as having an appropriate logo, look for red flags, such as a request for your password, username or other confidential information to process your donation.
- What does the url look like? Some scammers use shortened links or redirects to disguise that they have a different domain or are from another country. One way to double-check is to go to a different browser page and visit the same site, such as a bank or charity site. If it looks different or doesn’t ask for the same items, the first one may be a phishing attempt.
NYNJA is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. Contact us at NY (845) 664-4357, NJ (201) 785-7800 or send us an email at firstname.lastname@example.org for more information.