Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL

How to Mitigate a Phishing Attack > Take the Offensive - Pg. 58

58 chapTer 3 Phishing Attacks have departments dedicated to loss prevention and fraud. An e-mail or a phone can easily provide assurance of whether the message that you received is legitimate. It's important to note that any reference that you make should be performed out- side of the content of the message itself. If there is a link within a questionable message to contact customer service, don't click on it; instead, bring up a Web browser of your choice and go to the commercial site directly. Sometimes, a quick call or an e-mail can quickly address your concerns. Of course, there are other meth- ods of indirect methods to validate whether you're a target of a phishing attack. The Better Business Bureau C (BBB) has a consumer alert page that can provide consum- ers valuable insight to current activities as it relates to scams, whether by phone or digital media. Another great site that can provide assistance when seeking to vali- date e-mail messages is SCAMDEX, D which provides a wealth of information as it relates to nearly any and all scams which one may receive electronically. There is an ocean of Web sites that can provide support in validating against phishing attacks, and it's just a search away from finding them. These were mentioned simply to aid as a reference. Take the offensive When it comes to phishing attacks, we all should consider taking a more proactive stance in protecting ourselves. While tools and technology may aid in safeguarding us against potentially harmful messages, as you well know by now, there's no silver bullet. We owe it to ourselves to ensure that we take measures to inform and protect, given the wealth of tools that we now have in which to communicate can serve as a powerful aid against such criminals. So what can you do about it? Well, for starters let's begin with the foundational understanding that we all receive bank statements and credit card statements from our lenders each month. Given all the paperwork and validations we've already pro- vided, it should be clear that no financial institution would ever solicit you asking for your sensitive information. So understand fundamentally any and all messages that you would receive from a financial institution of any kind requesting for you to release sensitive information is not legitimate. If you were ever to receive such a mes- sage, report it immediately via phone or e-mail. Okay, so you're probably wondering whom to report it to, right? Well, as always, it depends. For the sake of our first example, if you happen to have a Facebook account and received a suspicious message, be sure to immediately notify Facebook. E All orga- nizations have an abuse or loss prevention center, which has very smart people who specialize and concentrate on these matters and take all of your inquiries seriously. Be sure to provide the original message so that they are clear what the potential threat is. The more evidence you can provide, the better suited they will be in catching the C D E