• Link to Facebook
  • Link to LinkedIn

Tel: 020 7250 3840

4TC Services
  • Home
  • IT Support
    • About Managed IT
    • Fully Managed
    • Proactive IT Support
    • Ad-Hoc
    • Mac Remote Management
    • Installation and Relocation
  • Backup
    • Direct to Cloud Backup
    • Disaster Recovery
  • Security
    • Digital ID & the Dark Web
    • Anti-Virus
    • Mail Archiving
    • Managed Anti-Spam
  • FileMaker
  • Cloud
    • IT as a Service – IaaS
  • About Us
    • Contact
    • Cookie Policy
    • Privacy Policy
    • GDPR – Statement
  • Telecoms
    • Teams – Voice and Video calling
  • Products
  • Blog
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
Computer

Know your Cyber Crime – An Introduction to Phishing

We all instinctively believe we know what to look out for when it comes to online crime – we all think we know when something looks a bit ‘fishy.’  But how many business owners are really clued-up on the vast array of techniques cybercriminals use to gain access to sensitive information, con and extort businesses and individuals out of their hard-earned cash?  In this series, we’ll look at a few of the methods used by these unscrupulous individuals and the damage that can result if you don’t take the necessary precautions.

What is Phishing?

‘Phishing’ is actually quite a broad term used to denote acts of deception and trickery designed to fool individuals into voluntarily divulging sensitive information.  It typically involves scammers assuming a false identity, which they then use to acquire various forms of sensitive information from targets, such as bank details and account logins.

Phishing scams can be perpetrated through various channels, such as website links, emails, text messages and phone calls, however, it is most commonly associated with Email.

The aim of the scammer is quite simple; to dupe the recipient into thinking that the Email comes from a trustworthy source so that they then comply with its contents and surrender vital information – sometimes scams also use malware embedded in attachments to infect the computers of targets and harvest information more stealthily.  Scammers use a variety of identities, but typically they opt for important figures in a target’s life (such as their boss) or an institution that the target is likely to pay attention to (such as their bank).

Phishing Techniques

While most scammers have broadly similar aims – often monetary reward – the techniques used to dupe and deceive vary widely.  Some of these are listed below.

  • Deceptive Phishing. This extremely common form of Phishing is one we have all come across at one time or another.  These attacks involve imitating well-known, familiar companies that are typically viewed as legitimate and trustworthy by most individuals.  They often use a sense of urgency or an ‘act now or something bad will happen’ message to compel individuals to divulge details, particularly account credentials!  Often these attacks are performed with no background knowledge of the target, so you might receive an email from a bank saying ‘your account has been breached, act now’ despite the fact that you don’t have an account with that particular institution.
  • Spear Phishing. Similar to ‘Deceptive Phishing’ but with one key difference; in Spear Phishing attacks the scammers have done their homework on you or your business.  These attacks are often more successful as scammers use personal, but publicly available information about individuals or businesses usually gathered from company websites and social media accounts.  By assuming the identity of a business or individual closely connected with the target, Spear Phishing attacks are more attention-grabbing than other phishing scams and result in a higher chance of the target engaging with the rogue email.
  • CEO Fraud. This is similar to ‘spear phishing’ in the sense that it’s is targeted and involves background research.  ‘CEO fraud’ involves scammers masquerading as senior executives within companies.. They use this identity to coerce other employees into performing transactions that usually wouldn’t be allowed – this works because employees often don’t like to challenge senior personnel and will oblige requests without question.
  • Cloning. This process involves deception by imitation.  Scammers will try to replicate a previously sent email from a genuine source such as a bank or online shopping account.  The appearance of this new email will be close to that of the original, but beware, as links and attachments will often contain malware.
  • Pharming. This type of Phishing involves directing targets towards malicious sites which are then used to ‘farm’ sensitive data and commit fraud.  This is done either using viruses installed on a user’s computer designed to steer web traffic towards the corrupt site or by using ‘DNS cache poisoning’ so that web users end up on the malicious site by accident and often without realising it.

Staying Secure – Simple steps to guard against Phishing attacks

At this point you might be thinking; ‘geez, there’s more to phishing than I thought.’  But don’t fear, by taking the following simple precautions you can prevent yourself or your employees from falling victim to Phishing scammers.

  • Check URLs. Verify the URL contained in a link before clicking on it.  Scammers try to closely replicate popular, legitimate sites however URLs are unique so this is something that will often give the game away. Similarly, if you are redirected, compare the web address of the site you’ve arrived at with what you know to be the web address of the genuine site before you disclose any sensitive information.
  • Don’t reply to suspicious emails. Say you receive an email from someone who appears (on the surface) to be your boss…but a few things don’t add up. The email is badly written, they’re using words they wouldn’t normally use and they’ve included an unusual request.  In such a situation ignore the email and instead make contact with the individual it appears to be from using contact details you already hold for them.
  • Be mindful of the information you make public. Use privacy settings on social media accounts to keep personal information away from prying eyes.  Even if you think you would never fall victim to targeted phishing, scammers might use the information on your social media to perform attacks against others in your circle.
  • Use anti-phishing software. Widely available and affordable,  these software programmes activate pop-up warnings when users try to access malicious links and websites.

When it comes to Phishing, inaction is often the best form of defence.  If something doesn’t look legitimate in any way, don’t interact!

We’re 4tc Managed IT Services

4TC can support you with all the services you need to run your business effectively, from email and domain hosting to fully managing your whole IT infrastructure.

Setting up a great IT infrastructure is just the first step.  Keeping it up to date, safe and performing at its peak requires consistent attention.

So we can act as either your IT department or to supplement an existing IT department. We pride ourselves in developing long term relationships that add value to your business with high quality managed support, expert strategic advice, and professional project management.

Search Search

Recent Posts

  • The Power of Proactive IT Support: Why Prevention Beats Cure
  • Understanding the Dark Web: How Digital ID Services Safeguard Your Company
  • How to Protect Your Business from Cyber Threats with Digital ID Monitoring
  • 10 Game-Changing Strategies to Boost Productivity and Optimise Your Business Operations
  • How to Work Smarter, Not Harder: The Ultimate Guide to Business Efficiency

Recent Comments

    Archives

    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • May 2017
    • June 2015

    Categories

    • 4TC
    • Anti-Spam
    • Blogs
    • Cyber Security
    • Data Science
    • Disaster recovery
    • IT Services
    • News
    • Services
    • Uncategorized

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    4TC Services

    Email: support@4tc.co.uk

    Tel: 020 7250 3840

    London Office

    5th Floor, 167‑169 Great Portland Street
    London
    W1W 5PF

    Essex Office

    Dew Gates The Street
    High Roding
    Essex
    CM6 1NT

    Signup for IT News!



      © Copyright - 4TC Services
      • Link to Facebook
      • Link to LinkedIn
      Link to: Cloud Configuration Error Exposes 260,000+ Actors Link to: Cloud Configuration Error Exposes 260,000+ Actors Cloud Configuration Error Exposes 260,000+ ActorsofficeLink to: Know your Cyber Crime – An Introduction to Vishing Link to: Know your Cyber Crime – An Introduction to Vishing ComputerKnow your Cyber Crime – An Introduction to Vishing
      Scroll to top Scroll to top Scroll to top