Phishing is a form of phishing technique. Phishing attacks often use dangerous email or websites to attract personal information as well as financial information of users or organizations. Attackers of this type will send a phishing email such as a reputable credit card company or any financial office that requires entering account information, which often presents a problem. When a user responds to this requested information, the attacker uses it to access the accounts.
-
You have to suspect that phone calls and emails are not required, asking personal or other inside information. If an individual you don't know asks to come to the organization, you should try to check their identity immediately.
-
Personal information or information of a specific organization should not be provided, such as its architecture or network unless you have confirmation from the relevant authority.
-
Do not disclose personal or financial information in the email, and should not respond to email requests for information. These requests may be included in the link sent in the email.
-
Do not send sensitive information on the Internet before checking the security of a website.
-
Be careful with the URL of a website. Dangerous websites may have a look like a valid page but the URL uses a different domain name completely.
-
If you do not guarantee whether the request of the email is valid, you should try to check it again by contacting the company directly. You should not use the contact information provided on the connection to the website in the requesting mail; instead, you should check the statement of contact information in advance. Also information about fake attacks is often provided online from groups such as the Anti-Phishing Working Group (http://www.antiphishing.org/phishing_archive.html).
-
Install and maintain anti-virus software, firewalls or email filters to avoid these dangers (see more about Some spam reduction measures). How do you understand anti-virus software, Find? understand the firewall (Firewall))