How to prevent cyber attacks on your business

What should you do if you discover malware on your computer?

If you suspect that your computer has been infected by malware, avoid using it for any private or personal transactions. Contact a computer professional as soon as possible to have your computer cleaned of all malicious programs. Some malware downloads other pieces of malware once it installs itself on a victim’s computer. So if there is one piece of malware, there is a good chance that there are more hiding in other places. Security is like a chain; it’s only as strong as its weakest link.

How does phishing work?

Phishing occurs when a fraudster impersonates a legitimate company or organization (this is the bait) using e-mail, faxes, and/or Web sites in an attempt to lure recipients into revealing confidential information. The messages are well crafted and are often difficult to distinguish from those of the companies they impersonate.

Although they are designed to be nearly impossible to distinguish from legitimate e-mails, there are some common signs to look for.

  • They urge the recipient to click on a link to update or verify account information.
  • They convey a sense of urgency and often mention negative consequences for failing to respond.
  • They do not contain any personalization — the recipient’s name, the last four digits of their account number or other information that shows that the sender knows something about the recipient’s account.
  • They are unexpected and are not consistent with other e-mails from the company.
  • They may contain spelling errors and bad grammar.

What is vishing?

Vishing is related to phishing in that the basic scam is the same. The fraudster is trying to trick you into divulging personal or financial information or to download malicious software. Vishing incorporates mass-distributed automated phone messages into the attacks. In this type of scam, special response phone numbers are used instead of fake e-mails and Web sites. The term ‘vishing’ is a combination of the words ‘voice’ and ‘phishing.’

How does SMiShing work?

The newest form of phishing targets cell phone and mobile device users. The term SMiShing is derived from a combination of the term ‘phishing’ and ‘SMS’ (short message service), which is the technology used for sending text messages.

Similar to phishing, SMiShing uses cell phone text messages to deliver the bait to get you to divulge personal information. The ‘hook’ — the method used to actually capture your information in the text message — may be a Web site URL.

However, it has become more common to see a phone number that connects to an automated voice response system.

Matthew J. Zeck, VP, CTP, is a treasury management sales manager with Fifth Third Bank, Greater Cincinnati Affiliate. Reach him at (513) 534-0344 or [email protected].