Phishing Must Be Considered for Privacy Controls and Data Protection

Phishing is a deception communication via email or a messaging service that deceives and entices users to open a malicious link or attachment. The phishing email may look like an email from a user’s employer, bank, or another known service provider. The link or attachment will then load an exploit that allows hackers to exploit a user’s system for nefarious reasons.

What are the precautions to take to prevent phishing: 

  • Use refreshed PC security apparatuses, for example, anti-virus software, spyware, and firewalls.
  • Never open suspicious or unknown email attachments.
  • Never uncover individual data asked for by email, for example, your name or credit card number.
  • Check the site URL is legitimate by typing the real address in your Web browser.
  • Check the site’s telephone number before ringing the number provided in the email.

What is the impact of phishing on privacy?

  • If users are not properly trained on how to avoid phishing, data misuse or loss can occur through an exploit.
  • Organizations need to have proper controls, policies, and processes in place to prevent phishing as part of an adequate data protection program.
  • Phishing is one of the top 10 attack vectors for hackers.

Types of phishing methods:

  • Spear phishing:  A malicious email targets a specific individual
  • Whaling:  This phishing targets high wealth or power individuals
  • Cloning: A legitimate email is modified to exploit the recipient
  • Link manipulation: Seemingly legitimate links take users to malicious content

Here are additional resources for information on phishing:

You just learned about Phishing, now explore related terms like Whaling and SPAM.