{"id":13392,"date":"2018-12-03T18:29:17","date_gmt":"2018-12-03T12:59:17","guid":{"rendered":"https:\/\/cigniti.com\/blog\/?p=13392"},"modified":"2024-04-10T11:16:44","modified_gmt":"2024-04-10T05:46:44","slug":"how-to-stay-protected-from-phishing-attacks","status":"publish","type":"post","link":"https:\/\/www.cigniti.com\/blog\/how-to-stay-protected-from-phishing-attacks\/","title":{"rendered":"How to Stay Protected from Phishing Attacks?"},"content":{"rendered":"

\u2018Camouflage\u2019 refers to hiding or disguising one\u2019s presence in a manner that makes it nigh impossible for others to identify\/recognize someone. While natural\u00a0camouflage\u00a0is an incredible thing \u2013 and increases an animal\u2019s chances of survival by deceiving predators \u2013 acting as a weapon for them to hunt or protect themselves from attacks \u2013 \u2018Phishing\u2019 is a form of camouflaged email that cybercriminals use for deceiving people and organizations, causing a lot of losses \u2013 whether financial or personal.<\/p>\n

What the cyber-criminals do is to create clones of legitimate websites, and then deceive people into entering personally identifiable information (personal data), their login credentials etc.<\/p>\n

Phishing, in cybersecurity<\/a>, is counted as one of the most common methods of email malware infection. Out of 1000+ IT security decision makers, 56% confessed that the targeted phishing attacks are the top security threats they had experienced. According to Gartner, 40% of ransomware attacks are initiated through email, resulting in $4.5 million in losses.<\/p>\n

It doesn\u2019t take much to realize, therefore, that Chief Risk Officers and Chief Technology Officers of large organizations must formulate strategies for protection from phishing attacks.<\/p>\n

Few Popular Phishing Techniques:<\/h2>\n
    \n
  1. \n

    Website Forgery<\/h3>\n

    A type of web-based attack where the phisher builds a completely autonomous website, a replica of a legitimate website, intended to deceive a user by extracting sensitive, personal information that could be used to launch other attacks on the victim.<\/li>\n

  2. \n

    Spoofing Attack<\/h3>\n

    A situation in which a person or program impersonates as another device of network by forging data, to gain an illegitimate advantage like to launch attacks against network hosts, steal data, spread malware or bypass access controls.
    \nTypes of spoofing attacks :<\/li>\n<\/ol>\n