{"id":445,"date":"2022-11-01T21:48:31","date_gmt":"2022-11-01T19:48:31","guid":{"rendered":"https:\/\/www.mycyberdevops.com\/?p=445"},"modified":"2022-11-01T21:52:38","modified_gmt":"2022-11-01T19:52:38","slug":"phishing","status":"publish","type":"post","link":"https:\/\/www.mycyberdevops.com\/?p=445","title":{"rendered":"Phishing"},"content":{"rendered":"\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p>Phishing is a form of social engineering that uses email or malicious websites to solicit personal information or to get you to download malicious software by posing as a trustworthy entity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Types of Phishing<\/strong><\/h2>\n\n\n\n<p>\u2022<strong>Spearphishing: <\/strong>Phishing targeted at an individual by including key information about them<\/p>\n\n\n\n<p>\u2022<strong>Whaling: <\/strong>Phishing targeted at a high-profile individual to steal sensitive and high-value information<\/p>\n\n\n\n<p>\u2022<strong>Vishing: <\/strong>Phishing via voice communication to entice the victim to engage in conversation and build trust<\/p>\n\n\n\n<p>\u2022<strong>Smishing: <\/strong>Phishing via text messages to get the victim to click on a link, download files and applications, or begin a conversation<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Simple Tips<\/strong><\/h2>\n\n\n\n<p>\u2022<strong>When in doubt, report it out: <\/strong>If it looks suspicious, it\u2019s best to mark it as \u201cjunk\u201d and forward to your IT staff.<\/p>\n\n\n\n<p>\u2022<strong>Think before you act: <\/strong>Be wary of communications that implore you to act immediately, offer something that sounds too good to be true, or ask for PII.<\/p>\n\n\n\n<p>\u2022<strong>Be wary of hyperlinks: <\/strong>Avoid clicking on hyperlinks in emails; hover your cursor over links in the body of the email\u2014if the links do not match the text that appears when hovering over them, the link may be spoofed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">&nbsp;<strong>Signs of Phishing<\/strong><\/h2>\n\n\n\n<p>\u2022Suspicious sender\u2019s address that may imitate a legitimate business<\/p>\n\n\n\n<p>\u2022Generic greetings and signature and a lack of contact information in the signature block<\/p>\n\n\n\n<p>\u2022Spoofed hyperlinks and websites that do not match the text when hovering over them<\/p>\n\n\n\n<p>\u2022Misspelling, poor grammar or sentence structure, and inconsistent formatting<\/p>\n\n\n\n<p>\u2022Suspicious attachments or requests to download and open an attachment<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Phishing is a form of social engineering that uses email or malicious websites to solicit personal information or to get you to download malicious software by posing as a trustworthy entity. Types of Phishing \u2022Spearphishing: Phishing targeted at an individual by including key information about them \u2022Whaling: Phishing targeted at a high-profile individual to steal &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.mycyberdevops.com\/?p=445\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Phishing&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":448,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,25],"tags":[],"class_list":["post-445","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-phishing"],"_links":{"self":[{"href":"https:\/\/www.mycyberdevops.com\/index.php?rest_route=\/wp\/v2\/posts\/445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mycyberdevops.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mycyberdevops.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mycyberdevops.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mycyberdevops.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=445"}],"version-history":[{"count":1,"href":"https:\/\/www.mycyberdevops.com\/index.php?rest_route=\/wp\/v2\/posts\/445\/revisions"}],"predecessor-version":[{"id":447,"href":"https:\/\/www.mycyberdevops.com\/index.php?rest_route=\/wp\/v2\/posts\/445\/revisions\/447"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mycyberdevops.com\/index.php?rest_route=\/wp\/v2\/media\/448"}],"wp:attachment":[{"href":"https:\/\/www.mycyberdevops.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mycyberdevops.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=445"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mycyberdevops.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}