• Link to Facebook
  • Link to LinkedIn

Tel: 020 7250 3840

4TC Services
  • Home
  • IT Support
    • About Managed IT
    • Fully Managed
    • Proactive IT Support
    • Ad-Hoc
    • Mac Remote Management
    • Installation and Relocation
  • Backup
    • Direct to Cloud Backup
    • Disaster Recovery
  • Security
    • Digital ID & the Dark Web
    • Anti-Virus
    • Mail Archiving
    • Managed Anti-Spam
  • FileMaker
  • Cloud
    • IT as a Service – IaaS
  • About Us
    • Contact
    • Cookie Policy
    • Privacy Policy
    • GDPR – Statement
  • Telecoms
    • Teams – Voice and Video calling
  • Products
  • Blog
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
Computer

Know your Cyber Crime – An Introduction to Vishing

‘Vishing’ uses some of the same deception techniques as ‘Phishing.’ The key difference is that ‘Vishers’ use VoIP phone systems to perform attacks instead of email and malicious websites.

Traditional landline telephony doesn’t provide the secrecy and anonymity that fraudsters require; numbers can be assigned to physical locations known to phone companies.  Caller ID spoofing is much easier using VoIP systems, so scammers are increasingly turning to such technology and taking advantage of greater anonymity inherent in internet-based technology.

Despite the different media of communication, the manipulation employed in vishing scams is very similar to that used in phishing.  ‘Vishers’ often try to create feelings of anxiety, fear, and urgency in victims to urge targets into sharing sensitive information without questioning the situation first.  Vishers also aim for the same air of legitimacy that Phishing scammers use, by creating fake caller ID profiles and using interactive voice response systems (IVR).

Vishing – What to look out for to avoid being stung

Similar to other types of deception scam, prevention is better than cure; separating the con artists from legitimate parties is the key.

‘Vishers’ often assume a variety of identities, but one of the most common is that of a bank or credit card company, as most people pay attention when they think their finances are under threat.  Often such calls contain an automated message featuring a ‘call to action.’  Such as

“Your account has been frozen due to a suspicious transaction. Please call this number to reactivate your account…’

Ignoring such a message can be difficult; you know something doesn’t feel right but you’re wary of doing nothing in case your bank account actually has been compromised.  The best course of action to take here is to contact the financial institution using legitimate channels, as opposed to the contact number given in the message.

Quite often, Vishing scammers also use temptation and opportunity to compel victims into disclosing details or making a payment:

“Congratulations you’ve one a new laptop in our weekly prize draw.  Please call this number to claim your prize…”

‘Claiming you’re prize’ will often involve paying some kind of fee that they promise will be refunded (it won’t).  They will often claim the fee is a payment to a third-party shipping provider and they’ll ask for your card details over the phone.

Alternatively, scammers may present you with an opportunity that’s too good to miss (an exclusive insurance offer just for you) or they may appeal to your conscience by asking for a charitable donation to a fabricated cause.  Ultimately, there is no single template these scammers use so when you’re being panicked into action or something seems too good to be true take a step back and proceed with great care.

Guarding against Vishing attacks

Most businesses receive countless phone calls on a working day.  Most of these will be above board, but it’s worth educating your staff on the trademarks of the Vishing scammer and the action to take to avoid becoming their next victim.

  • Stay alert. You don’t trust every email so why should you trust every phone call?  Familiarise your team with the technique’s scammers use so they know what to listen out for.
  • Don’t be panicked into action. Legitimate operators don’t whip customers into a nervous frenzy.  Be very wary if a caller is using emotive language to create an extreme sense of urgency.
  • Remain composed and in control. A scammer may appeal for seemingly innocuous information that could be part of a larger scam such as identity theft.  Scammers often have an answer for everything, they know their script and use smooth talk to charm information out of their victims.  Don’t be seduced!  If you feel uncomfortable giving out any form of information to an entity, you’re unsure of, just hang up and get on with your day.
  • Ignore unknown numbers. Legitimate callers will often leave messages prompting you to reach out to them.
  • Know your bank’s security policy. Financial institutions never ask for things like online account logins over the phone…ever!  Familiarise yourself with the steps your bank would take if your account were compromised so you’re able to identify a legitimate breach.

Here at 4TC, we can help your business with all aspects of cybersecurity.  Our expertise covers a wide range of bases, from proactive maintenance and Backups to full-network anti-virus and managed anti-spam solutions.  We provide managed services, project management and advice to ensure the businesses we work with remain out-of-bounds to Cybercriminals.

We’re 4tc Managed IT Services

4TC can support you with all the services you need to run your business effectively, from email and domain hosting to fully managing your whole IT infrastructure.

Setting up a great IT infrastructure is just the first step.  Keeping it up to date, safe and performing at its peak requires consistent attention.

So we can act as either your IT department or to supplement an existing IT department. We pride ourselves in developing long term relationships that add value to your business with high quality managed support, expert strategic advice, and professional project management.

Search Search

Recent Posts

  • The Power of Proactive IT Support: Why Prevention Beats Cure
  • Understanding the Dark Web: How Digital ID Services Safeguard Your Company
  • How to Protect Your Business from Cyber Threats with Digital ID Monitoring
  • 10 Game-Changing Strategies to Boost Productivity and Optimise Your Business Operations
  • How to Work Smarter, Not Harder: The Ultimate Guide to Business Efficiency

Recent Comments

    Archives

    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • May 2017
    • June 2015

    Categories

    • 4TC
    • Anti-Spam
    • Blogs
    • Cyber Security
    • Data Science
    • Disaster recovery
    • IT Services
    • News
    • Services
    • Uncategorized

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    4TC Services

    Email: support@4tc.co.uk

    Tel: 020 7250 3840

    London Office

    5th Floor, 167‑169 Great Portland Street
    London
    W1W 5PF

    Essex Office

    Dew Gates The Street
    High Roding
    Essex
    CM6 1NT

    Signup for IT News!



      © Copyright - 4TC Services
      • Link to Facebook
      • Link to LinkedIn
      Link to: Know your Cyber Crime – An Introduction to Phishing Link to: Know your Cyber Crime – An Introduction to Phishing Know your Cyber Crime – An Introduction to PhishingComputerLink to: Know your Cyber Crime – An Introduction to Ransomware Link to: Know your Cyber Crime – An Introduction to Ransomware ComputerKnow your Cyber Crime – An Introduction to Ransomware
      Scroll to top Scroll to top Scroll to top