Social Engineering: A Lesson on Phishing
Social engineering refers to a broad range of security threats that exploit human interaction to achieve malicious goals. One of the most prevalent, effective and dangerous forms of social engineering is phishing.
Phishing involves tricking individuals into providing sensitive information under false pretences. This can happen via email, text messages, or even phone calls.
Types of Phishing Attacks
Phishing attacks come in various forms, and it’s important to understand the differences:
Whaling: This form targets senior executives, often aiming to access highly confidential information or disrupt operations at the highest levels of an organisation.
Spear Phishing: These attacks are aimed at specific individuals or groups, often by impersonating someone the target trusts.
Smishing: In this attack, scammers use SMS messages to trick individuals into clicking on malicious links or calling fraudulent phone numbers.
Vishing: This involves scammers using voice calls, posing as legitimate representatives, to obtain sensitive information.
Email Phishing: The most common type, involves fraudulent emails designed to create a sense of urgency. They often contain malicious links or attachments.
How to Spot a Phishing Attempt
As phishing techniques evolve, it becomes increasingly difficult to spot these attacks. However, there are key indicators you can watch out for to protect yourself. The number one rule of thumb is to always be wary or suspicious because if it looks suspicious, it probably is. Some of the other ways to spot a phishing attack include:
Grammatical errors: Phishing emails often contain spelling mistakes or awkward sentence structures.
Suspicious sender addresses: Check for inconsistencies in the sender's email address, such as unusual characters or misspellings. The email may include links which may or may not be hidden in plain text that lead to malicious websites, allowing attackers to steal your data.
Urgent or Threatening Language: Phishing emails often create a false sense of urgency or use fear to prompt immediate action.
What to Do If You Suspect a Phishing Attack
If you believe you are being targeted by a phishing attack, follow these steps:
Stop all actions immediately.
Do not click any links or open attachments.
Avoid replying to the sender.
Report the email to your IT department or other appropriate channels.
Delete the email to prevent accidental interaction.
How to Protect Yourself
To minimize your chances of falling victim to a phishing attack:
Double-check the URL of any website before entering sensitive information.
Verify any suspicious requests by contacting the sender through a different communication channel.
When in doubt, trust your instincts—if something feels off, it probably is.
When it comes to security, it’s always better to be safe than sorry!
Subscribe to my newsletter
Read articles from Oluwadamilola Bamigbose directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
Oluwadamilola Bamigbose
Oluwadamilola Bamigbose
I thrive In the intersection of technology and business. My journey unfolds through roles in Business Development, Cybersecurity, and Project Management, each chapter adding layers to my versatile skill set. My cybersecurity expertise involves compliance assessments and implementing robust measures to fortify against cyber threats. I take pride in preventing losses and breaches through meticulous risk assessments and management. I bring a solid technical foundation to cybersecurity management, risk assessment, and network defense. As a seasoned Project Manager, I've led diverse teams through Agile methodologies, ensuring the successful launch of projects. Effective communication, collaborative leadership, and a commitment to continuous learning define my professional approach. Proficient in English and Yoruba, I excel in multicultural environments.