{"id":647,"date":"2013-04-12T16:35:24","date_gmt":"2013-04-12T16:35:24","guid":{"rendered":"https:\/\/blogs.poly.com\/?p=647"},"modified":"2013-04-12T16:35:24","modified_gmt":"2013-04-12T16:35:24","slug":"take-steps-to-avoid-phishing-scams-at-your-small-business","status":"publish","type":"post","link":"https:\/\/blogs.poly.com\/take-steps-to-avoid-phishing-scams-at-your-small-business\/","title":{"rendered":"Take steps to avoid phishing scams at your small business"},"content":{"rendered":"
This is just one example of how a phishing scam can harm your small business. While not everyone will be tricked by a hacker; the messages can be very sophisticated. By replicating a logo, a cyber criminal can send an email that looks like it came from your bank or another organization you do business with. Data <\/a>from a few years back indicates that phishers are able to convince up to five percent of recipients to respond to their emails.<\/p>\n Get your team on board<\/strong><\/p>\n Also make sure your team never opens attachments that accompany spam emails; the majority of them are malicious. One click can give a hacker entre to critical company information or bring a deluge of spam on your small business.<\/p>\n Take other steps<\/strong><\/p>\n Don\u2019t overlook mobile devices<\/strong><\/p>\n As you consider how to protect your data, be aware that mobile devices<\/a> are becoming an increasingly popular target for phishing scams. Trend Micro<\/a> reports that in 2012, the firm found 4,000 phishing URLs designed for mobile Web. The figure is considerably less than other malicious URLs tracked for the year; but Trend Micro points out the figure demonstrates that mobile devices are a valid platform to launch an attack.<\/p>\n Trend Micro attributes the rise in attacks on mobile devices to the limitations of the devices themselves. The small screen makes it difficult for users to fully inspect websites to ensure they have anti-phishing security. Most mobile devices use default browsers so cyber criminals only have to focus on one type of browser versus several. And finally, Trend Micro says users may not realize mobile devices are just as vulnerable as desktop systems to attack.<\/p>\n Keep these steps in mind to avoid phishing for trouble at your small business.<\/p>\n <\/p>\n","protected":false},"excerpt":{"rendered":" Earlier this year, small businesses were the target of a […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[510],"tags":[979,740,929,980,580],"_links":{"self":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts\/647"}],"collection":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/comments?post=647"}],"version-history":[{"count":0,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts\/647\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/media?parent=647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/categories?post=647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/tags?post=647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<\/a>Earlier this year, small businesses were the target of a phishing scam <\/a>that involved fake emails that appeared to be sent from the Federal Trade Commission (FTC). The email advised small business owners that their company was under investigation due to numerous consumer complaints. Users were prompted to click on a link to find out more. Recipients who clicked on the link were not directed to the FTC. Instead, malware was installed on computers with the goal of stealing financial or other sensitive company data.<\/p>\n
<\/a>The first line of defense against phishing is training your staff to be aware of phishing scams. Since banks are the most targeted institutions, advise your team NEVER to respond to emails that request personal information and to ONLY visit bank websites by typing the URL into the address bar. You\u2019ll also want to keep a regular check on accounts to make sure there is nothing suspicious going on.<\/p>\n
\n
\n
\n