Contingency Corner: Phishing Schemes
Phishing schemes lure victims into providing login credentials or sensitive data that can be used to steal money or other sensitive data that can be sold.
Consider these basic steps to improve your awareness of phishing schemes:
- Legitimate organizations will rarely contact you to request your password
- Be cautious with email accounts or phone numbers you don’t recognize
- Avoid interacting with attachments or links sent by unknown contacts
- Be cautious about sharing personal data on social media
- Leverage two-factor authentication on your accounts and devices
Leverage public resources like those from the US or UK governments to understand and report phishing schemes.
Interested in strengthening your organization’s security and contingency posture? Contact our team.