1 / 3

Tips From Semalt: How To Identify A Phishing Scam

Semalt, semalt SEO, Semalt SEO Tips, Semalt Agency, Semalt SEO Agency, Semalt SEO services, web design, web development, site promotion, analytics, SMM, Digital marketing

kuku
Download Presentation

Tips From Semalt: How To Identify A Phishing Scam

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 23.05.2018 Tips From Semalt: How To Identify A Phishing Scam Phishing is an attempt by scammers to try to dupe unknowing users. They disguise their messages to resemble those from legitimate companies and then trick people into giving out their details, and consequently use them for identity theft. Some of the details targeted as such as a BT username, or password. It is important to note that BT never asks for private information or even banking details without reason. Also, BT emails never have attachments. Julia Vashneva, the Semalt Senior Customer Success Manager, advises all Internet users to be always on the lookout for such signals as they indicate a potential scam. How to Spot a Phishing Email Emails that insist on user veri?cation, or ask for personal information are suspicious, and users need to avoid them. They take the following forms: Unanticipated emails that provide too good to be true offers An email link that redirects to a website, which asks one to verify the details of an account. Fraudsters create a narrative that involves urgency to lure victims. Always use typed URLs and not those embedded in email messages. https://rankexperience.com/articles/article1186.html 1/3

  2. 23.05.2018 Analyze the correctness of the grammar and images used in the email. Steps to Take Upon Receiving a Phishing Email The action taken depends on how the user opened the email. The department tasked with dealing with phishing emails at BT use phishing@bt.com if one wishes to get in touch with them. If one has not clicked or replied to the links provided, but opened the email, there is no cause to worry. There is a chance that no compromise has occurred, one should ?ag the email and send it to the phishing department at BT, and the get rid of it. If one clicked on the link, or downloaded an embedded attachment, but ?lled nothing in the form, one should run a virus check and then report the email. If one provided their details, the ?rst thing to do is to scan the computer for safety reasons. Then, re-secure the BT account as there may be a chance of compromise. There are guides on how to deal with the compromised accounts, and emails. On the side of the customer, changing passwords and experts recommend using a unique one for each account. Banks require noti?cations to ?ag any unusual activity if one has already given out their bank details. Finally, report the email to the phishing department. Who receives phishing emails? There are close to 37.3 million users who receive phishing emails as per the statistics from 2012 and 2013. The most probable explanation is that there are different ways that scammers use to obtain user emails to use for their phishing endeavors. They use automated bots, fake websites, hacking genuine website databases, purchasing lists from other fraudsters, pretending to be websites that prevent phishing emails. Receiving such an email does not automatically put the user at risk, it is the action taken after that that puts them at risk. Protecting Against Phishing Activity The company provides BT Protect, which helps prevent malware attacks on all devices connected to the internet. Downloading the BT NetProtect Plus is an added advantage as it provides its users with noti?cations on possible threats since BT forwards all phishing emails from other users to the NetProtect Plus team. Always turn the spam ?lter on to mitigate threats. Make sure to update all website software. https://rankexperience.com/articles/article1186.html 2/3

  3. 23.05.2018 Never reply to a suspicious email. BT Provisions to Ensure Customer Protection The company has provided a link to which users can forward all suspicious email, which they then take down immediately. It helps with monitoring all websites deemed to participate in phishing activity and takes them down when caught in the act. https://rankexperience.com/articles/article1186.html 3/3

More Related