Reflecting on Phishing Attacks

in Digital Lifestyle15 hours ago (edited)

Being a cyber security comes with a great responsibilities; to protect virtual lifes and sensitive files from unauthorized access. Presently, every industry and organizations embraces online lifestyle through creation of websites, Social networking platforms, and Applications. This is one of the easiest and fastest way to access and attend to customers. It is also why every organization both social networking companies, private and public organizations needs a Cyber SOC analyst to help monitor; to protect the confidentiality, integrity, and availability against unauthorized access and cyber-attacks.

AC1CB9BA-7613-466F-B277-88759CFB2E57.jpeg

Phishing attacks is one of the most common cyber attacks in our today’s world. I was once a victim of this attack and lost my savings because I was ignorant about cyber attacks. This experience made me really sad because it was for me to save such an amount at that time. This prompted me to learn Ethical hacking And also Security Operations Center Analyst. I first started by learning from Cisco on the introduction to cyber security maybe it me be of full interest to me and later I got to love the world of cybersecurity more day by day from practices and using of tools and techniques. I am a kinesiologist by profession and I am beginning to love the world of cybersecurity.

Phishing attacks involve the use of messages, emails, and website links for fraudulent acts to manipulate people into sharing sensitive information or data or installing malware that can affect an individual financial or personal life.

5DA5A455-E708-4D87-8C8E-FAB54E4ABEC0.jpeg

While we were researching phishing attacks when discovered some historical phishing experiences that affected a lot of individuals and left organizations in debt.
Below is a reference sample of one;
https://www.graphus.ai/blog/worst-phishing-attacks-in-history/
https://www.itgovernance.eu/blog/en/the-5-biggest-phishing-scams-of-all-time

Reading this makes me wonder how did the people heal from these attacks. The most vulnerable one of them is the colonial pipeline attack. An attack that was worth 3.4billion euros. I read it was a RANSOMWARE attack and all access was denied at this moment due to software that was installed in a worker's computer. This is why we need to be careful of whatever apps we click on or download onto our computer.

My experience with phishing attacks was that I clicked an email message and my email was linked to my Foreign account. This was like easy access for them, just to forget passwords and generate code to log in there and withdraw as much as possible. Every bank has a default password same also with every site or Windows software.

7A441896-B880-4E6A-92A8-3994DD4CD9FB.jpeg

Here are general basic ways cyber theft uses phishing to access people's sensitive information

  • Through Emails.
  • Phone calls
  • Messages
  • Downloads

What to do when you experience phishing Attacks

  • Change your passwords immediately.
  • Report sensitive messages or calls to your network provider or customer services.
  • Use your anti-virus to scan your network for Malware attacks
  • Disconnect your internet as this is one easy way for them to access you fast.

How Not to be a Victim of Phishing Attacks

  • Avoid clicking links from Unauthorized sources
  • Do not share your sensitive information with a stranger online.
  • Any Sites you are uncomfortable with or uncertain of their authenticity, do not drop your personal information in this sight as it can be used to trace you easily.
  • Avoid clicking anyhow Ads that pop up on your phone as this can also be a way for them to access your computer or phone.
  • Do not click on suspicious links
  • Always be on alert after you experience strange activities on your phone.
  • Do not install strange or suspicious applications.
  • Avoid adding Strange Friends requests online.

Daily these attackers try different schemes and techniques to access people's profiles and sensitive information but we must be at least one of these people so as not to be a victim of their selfish greediness and fraudulent acts.

Thank you for Reading My Post

All Pictures Owned By Me

Posted Using InLeo Alpha

Sort:  

Being informed on how these things work, considering I have some littlevknowledge about cyber attacks, and I have a couple of tech guys in my corner, I know to not click on every link or reply to every message. It's becoming even increasingly easier by the day for these people to perpetuate these evil, seeing that there's lot of activities buzzing around the internet and people readily jump in.

However, some of the tips here still come in handy. Thank you for schsting, tech bro.

Thank you for your lovely 😊 response, 😂 “Tech bro" am still a learner oo