Hi! I’m Brad from Idealogical Systems and today I’m here with my trusted colleague Darren. For the sake of this video you can us call “Brarren” and today we’re gonna talk to you about Phishing.
I love Fishing!
No! Stop! Stop! Stop! We’re talking about Phishing with a PH today. While fishing with an F can be fun and relaxing. Something we do on a weekend., phishing with a PH is much more dangerous. This tries to steal your passwords and account information and there’s a few ways that this can trick you.
The most common way these emails can get information from you is with Deceptive Phising. With Deceptive Phishing you will receive an email from a source copying a legitimate company. For example, you may receive an email from a popular social media site. This email then will lead you then to another site where your information is taken when you type it in.
Another way they try to get you is through Malware Phishing. The sender in this case wants you to download a file to run on your computer. They do this through interesting promotions where they advertise something that you’re interested in. Maybe a new piece of software like an anti –virus , maybe a piece of music that you’re interested in or an image. Once these files are being run on your computer, now they have access not only to your computer but your network data as well.
The easiest way to avoid all these is by ignoring any websites or emails that you do not trust. If you get an email from a person or company that you don’t trust be careful before opening it. If you are asked to download anything and you aren’t sure if there’s suppose to be a file transferred to your computer, its best to just delete it.
This might sound scary but it’s easy to avoid. Keep in mind that no legitimate website like a banking site or a social media site will ever ask you for confidential information through an email. If you do receive an email that does ask you for confidential information, be very cautious and delete that email. Following these steps is going t0 help you prevent viruses and malicious programs from entering your machine.