CIO Advisor Apac talks about spam and phishing activities and also how to protect yourself from these activities.
Spam is that the electronic equivalent of the ‘junk mail’ that arrives on your doormat or in your mailbox. However, spam is quite just annoying. It are often dangerous — especially if it’s a part of a phishing scam.
Phishing may be a sort of online fraud during which fraudsters trick users into submitting personal information to illegitimate websites.
How to protect yourself against spam email and phishing
1. Set up multiple email addresses
It’s an honest idea to possess multiple email addresses:
2. Private email address
This should only be used for private correspondence. Because spammers build lists of possible email addresses — by using combinations of obvious names, words and numbers — you ought to attempt to make this address difficult for a spammer to guess.
Your private address shouldn’t simply be your first and surname — and you have to protect the address by doing the following:
- Never publish your private email address on publicly accessible online resources.
- If your private address is discovered by spammers — you have to change it. Although this might be inconvenient, changing your email address will assist you to avoid spam.
3. Public email address
Use this address once you got to register on public forums and in chat rooms, or to subscribe mailing lists and other Internet services. the subsequent tips also will assist you to scale back the quantity of spam you receive via your public email address:
- Treat your public address as a short lived address. the probabilities are high that spammers will rapidly line up of your public address — especially if it’s frequently getting used on the web .
- Don’t be afraid to vary your public email address often.
- Consider using variety of public addresses. That way you’ll have a far better chance of tracing which services could also be selling your address to spammers.
Best Ways to Avoid Phishing Scams
Whether it’s getting access to passwords, credit cards, or other sensitive information, hackers are using email, social media, phone calls, and any form of communication they can perform to steal valuable data. Businesses, of course, are a particularly worthwhile target.
There are various phishing techniques that attacker uses:
- Embedding a link in an email that redirects your employee to an unsecured website that requests sensitive information.
- Installing a virus through a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information.
- Spoofing the sender address in an email to appear as a reputable source and request sensitive information. Email spoofing is the forgery of an email header/address/content so that the message appears to have originated from someone or somewhere other than the actual source.
- Attempting to obtain company information over the phone by impersonating a known company vendor or IT department.