{"id":9987,"date":"2022-10-20T13:36:51","date_gmt":"2022-10-20T13:36:51","guid":{"rendered":"https:\/\/nytpsolutions.com\/?p=9987"},"modified":"2022-10-20T13:50:04","modified_gmt":"2022-10-20T13:50:04","slug":"phishing-and-smishing","status":"publish","type":"post","link":"https:\/\/nytpsolutions.com\/?p=9987","title":{"rendered":"Phishing and Smishing"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9987\" class=\"elementor elementor-9987\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f5614cb elementor-section-boxed elementor-section-height-default elementor-section-height-default rr-addons-sticky-no\" data-id=\"f5614cb\" data-element_type=\"section\" data-settings=\"{&quot;rr_addons_sticky&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-866ddd2\" data-id=\"866ddd2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-711f5a0 rr-addons-sticky-no elementor-widget elementor-widget-image\" data-id=\"711f5a0\" data-element_type=\"widget\" data-settings=\"{&quot;rr_addons_sticky&quot;:&quot;no&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 26-05-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"684\" src=\"https:\/\/nytpsolutions.com\/wp-content\/uploads\/2021\/10\/Hacker-1024x684.jpg\" class=\"attachment-large size-large wp-image-9870\" alt=\"Cyber Criminals\" srcset=\"https:\/\/nytpsolutions.com\/wp-content\/uploads\/2021\/10\/Hacker-1024x684.jpg 1024w, https:\/\/nytpsolutions.com\/wp-content\/uploads\/2021\/10\/Hacker-300x200.jpg 300w, https:\/\/nytpsolutions.com\/wp-content\/uploads\/2021\/10\/Hacker-768x513.jpg 768w, https:\/\/nytpsolutions.com\/wp-content\/uploads\/2021\/10\/Hacker-1536x1026.jpg 1536w, https:\/\/nytpsolutions.com\/wp-content\/uploads\/2021\/10\/Hacker-2048x1368.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-353c71b elementor-section-boxed elementor-section-height-default elementor-section-height-default rr-addons-sticky-no\" data-id=\"353c71b\" data-element_type=\"section\" data-settings=\"{&quot;rr_addons_sticky&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a29896b\" data-id=\"a29896b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-85e41c3 rr-addons-sticky-no elementor-widget elementor-widget-text-editor\" data-id=\"85e41c3\" data-element_type=\"widget\" data-settings=\"{&quot;rr_addons_sticky&quot;:&quot;no&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 26-05-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p style=\"margin: 0in; text-indent: .5in;\">As cliche as it may sound, the rate and frequency of cyberattacks on both businesses and individuals has increased markedly, particularly during the COVID-19 epidemic. Work-from-home policies brought work computers outside of the walled gardens of workplace intranets, providing hackers additional vulnerabilities to access proprietary data and hardware.<\/p><p style=\"margin: 0in; text-indent: .5in;\">One of the most potent tools in a hacker\u2019s arsenal is also one of the lowest tech &#8211; social engineering &#8211; or the psychological manipulation of an individual with access to data\/systems into giving up access, often without them being fully aware of what\u2019s happening. Phishing is a commonly used tactic by hackers, in which a message (such as an email, text message, or IM) is sent purporting to be from a reputable source (often visually mimicking an email\/message), such as one\u2019s boss or a government agency, and often implores that the reader do something, such as clicking a link, downloading a or logging into a platform in order to gain access.<\/p><p style=\"margin: 0in; text-indent: .5in;\">Phishers will often phrase the email\/message with a sense or urgency, trying to incite the reader into a state of immediate and uncritical action which can result in one making hasty actions. Cybercriminals may use \u201ctyposquatting\u201d techniques where they use misspelled variants of well-known companies or organizations as the sender email that\u2019d likely be overlooked in a brief glance going through emails or URL links embedded within them. Additionally, phishers will also often use generic email addresses that end in @gmail.com @outlook.com that are available for individuals and are not associated with the web domains of actual businesses. Moreover, phishing emails are typically (though not always) characterized by awkward or improper grammar, which can be the result of schemes that are developed by scammers living abroad. Finally, requests for payment using methods that are more difficult to trace, such as wire transfers, money orders (such as Western Union), gift cards, and cryptocurrencies (including Bitcoin and Ethereum) are additionally correlated<\/p><p style=\"margin: 0in; text-indent: .5in;\">With the continued growth in popularity in text messages over the past few decades, phishing over SMS or \u201csmishing\u201d, has grown alongside it. Unlike phishing through emails, which often allow for larger attachments, smishing schemes will typically include a URL to an external site at the end of the message. According to Texedly, some of the more common smishing themes and ploys are &#8211; winning a contest that you probably never entered (probably the oldest trick in the book), the IRS is trying to contact you, information regarding a bank account (scammers will often use the names of popular banks, such as Chase and M&amp;T Bank), or info regarding a purportedly recent online transaction (such as a rebate for a recent Amazon purchase).<\/p><p style=\"margin: 0in; text-indent: .5in;\">When it comes to many of these confidence tricks, one of the most important things to remember is that if a message seems suspicious, assume that the message is illegitimate. If you receive an urgent message from what appears to be your boss or one of your coworkers, but you\u2019re not sure if the message is really from them, you can try asking them directly, either in person or in a separate email\/message to confirm. Also, if your organization has an IT department, they will likely be able to assist you with any questions you may have regarding the validity of messages you\u2019ve received and how to detect fraudulent messages within your organization.<\/p><p style=\"margin: 0in; text-indent: .5in;\">If your business is seeking a comprehensive solution to IT concerns, New York Technology Solutions is here to serve as a trusted guide and assistant for a myriad of key technology services, including IT Management, Cybersecurity, and Managed Backup. NYTP can also assist your business with hardware and software sales with extensive experience in IT Management plans starting as low as $7.99 a month. For more information, visit our website at <strong>www.nytpsolutions.com<\/strong>, or call us at<strong> (585) 300-4720.<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>As cliche as it may sound, the rate and frequency of cyberattacks on both businesses and individuals has increased markedly, particularly during the COVID-19 epidemic. Work-from-home policies brought work computers outside of the walled gardens of workplace intranets, providing hackers additional vulnerabilities to access proprietary data and hardware. One of the most potent tools in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-9987","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"_links":{"self":[{"href":"https:\/\/nytpsolutions.com\/index.php?rest_route=\/wp\/v2\/posts\/9987","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nytpsolutions.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nytpsolutions.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nytpsolutions.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nytpsolutions.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9987"}],"version-history":[{"count":5,"href":"https:\/\/nytpsolutions.com\/index.php?rest_route=\/wp\/v2\/posts\/9987\/revisions"}],"predecessor-version":[{"id":9992,"href":"https:\/\/nytpsolutions.com\/index.php?rest_route=\/wp\/v2\/posts\/9987\/revisions\/9992"}],"wp:attachment":[{"href":"https:\/\/nytpsolutions.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9987"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nytpsolutions.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9987"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nytpsolutions.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9987"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}