{"id":8214,"date":"2015-10-19T10:05:36","date_gmt":"2015-10-19T10:05:36","guid":{"rendered":"https:\/\/tsisupport.com\/?p=571"},"modified":"2020-09-28T00:13:12","modified_gmt":"2020-09-28T04:13:12","slug":"the-danger-of-phishing","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=8214","title":{"rendered":"The Danger of Phishing"},"content":{"rendered":"<p><strong>Phishing<\/strong> \u2013 you\u2019ve probably heard of it. It\u2019s one of the most common types of <a href=\"https:\/\/tsisupport.com\/tsistaging\/it-services\/cybersecurity-services\/\" target=\"_blank\" rel=\"noopener noreferrer\">cyber attacks <\/a>and users are constantly warned about its dangers. It\u2019s so prevalent, in fact, that many cloud email providers (think Gmail and Yahoo!) provide an alert within any suspicious looking message that it may be a Phishing attempt. Commonly, users are warned about the dangers of clicking links in emails from senders they don\u2019t know and are told not provide to passwords or input any sensitive information to a website that looks suspicious. Unfortunately those are just some of the most common ways that attackers are now gaining access to sensitive data and materials.<\/p>\n<p>The \u201cNigerian Prince\u201d emails are infamous and most people receiving them know they\u2019re a scam, but there are other ways that attackers can convince individuals to wire them funds. <strong>Email Spoofing<\/strong> is a type of cyber attack (and is considered Phishing) that allows a party to send an email that looks <em>exactly<\/em> as if it\u2019s coming through a specific network using a specific username.<\/p>\n<p>Unfortunately, there have been cases reported of employees receiving emails they think are being sent by their co-worker or a supervisor requesting wire transfers of funds or access to secure information. In these instances, the individual has no reason to question <em>who<\/em> is sending the email because it\u2019s coming from an email address they recognize and from within their organization. They may question <em>why<\/em> the request is being made, but in some instances \u2013 depending on the industry and the nature of business that is regularly conducted \u2013 even a request for a large wire transfer may not put up any red flags.<\/p>\n<p>Thankfully, this type of scam can\u00a0be mitigated\u00a0by having the appropriate anti-spam techniques in place as well as by educating your employees about the latest techniques used by these scam artists. By ensuring that your organization has a <strong>Sender Policy Framework<\/strong> (<strong>SPF<\/strong>) in place, domain owners are able to specify which computers are authorized to send mail with a sender address from that domain. This helps to stop\u00a0an attacker from being able assume the identity of someone within the organization.<\/p>\n<p><em><strong>For more information on ensuring that your company has the necessary security protocols in place, call us at (508) 543-6979, or <a href=\"http:\/\/bit.ly\/1KoDbtA\" target=\"_blank\" rel=\"noopener noreferrer\">click here to request a Security Assessment<\/a>. <\/strong><\/em><\/p>\n<p><em><strong>Also, check out this infographic below for more information on Phishing (<a href=\"http:\/\/bit.ly\/1OOojdT\" target=\"_blank\" rel=\"noopener noreferrer\">click for full document<\/a>).<\/strong><\/em><\/p>\n<p><em>Infographic via TraceSecurity.com<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing \u2013 you\u2019ve probably heard of it. It\u2019s one of the most common types of cyber attacks and users are constantly warned about its dangers. It\u2019s so prevalent, in fact, that many cloud email providers (think Gmail and Yahoo!) provide an alert within any suspicious looking message that it may be a Phishing attempt. Commonly,&hellip;<\/p>\n","protected":false},"author":8,"featured_media":8329,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[130,131,132,133,134],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Danger of Phishing - TSI Support<\/title>\n<meta name=\"description\" content=\"Learn about phishing, one of the most common types of cyberattacks, and how it can affect the IT network and sensitive data of your small business.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Danger of Phishing - TSI Support\" \/>\n<meta property=\"og:description\" content=\"Learn about phishing, one of the most common types of cyberattacks, and how it can affect the IT network and sensitive data of your small business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=8214\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-19T10:05:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-28T04:13:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/10\/The-Danger-of-Phishing-1140x380-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brian Downey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brian Downey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8214\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8214\",\"name\":\"The Danger of Phishing - TSI Support\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8214#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8214#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/10\/The-Danger-of-Phishing-1140x380-1.jpg\",\"datePublished\":\"2015-10-19T10:05:36+00:00\",\"dateModified\":\"2020-09-28T04:13:12+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c\"},\"description\":\"Learn about phishing, one of the most common types of cyberattacks, and how it can affect the IT network and sensitive data of your small business.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8214#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=8214\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8214#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/10\/The-Danger-of-Phishing-1140x380-1.jpg\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/10\/The-Danger-of-Phishing-1140x380-1.jpg\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8214#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Danger of Phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c\",\"name\":\"Brian Downey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g\",\"caption\":\"Brian Downey\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=8\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Danger of Phishing - TSI Support","description":"Learn about phishing, one of the most common types of cyberattacks, and how it can affect the IT network and sensitive data of your small business.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Danger of Phishing - TSI Support","og_description":"Learn about phishing, one of the most common types of cyberattacks, and how it can affect the IT network and sensitive data of your small business.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=8214","og_site_name":"TSI Support","article_published_time":"2015-10-19T10:05:36+00:00","article_modified_time":"2020-09-28T04:13:12+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/10\/The-Danger-of-Phishing-1140x380-1.jpg","type":"image\/jpeg"}],"author":"Brian Downey","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Brian Downey","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8214","url":"https:\/\/tsisupport.com\/tsistaging\/?p=8214","name":"The Danger of Phishing - TSI Support","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8214#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8214#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/10\/The-Danger-of-Phishing-1140x380-1.jpg","datePublished":"2015-10-19T10:05:36+00:00","dateModified":"2020-09-28T04:13:12+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c"},"description":"Learn about phishing, one of the most common types of cyberattacks, and how it can affect the IT network and sensitive data of your small business.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8214#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=8214"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8214#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/10\/The-Danger-of-Phishing-1140x380-1.jpg","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/10\/The-Danger-of-Phishing-1140x380-1.jpg","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8214#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"The Danger of Phishing"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c","name":"Brian Downey","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g","caption":"Brian Downey"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=8"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/8214"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8214"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/8214\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8329"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}