It’s all about trust
While companies are already acting consistently against cyber threats, the end user is still far from achieving a security practice that is considered ideal.
November 2022With the increase in cybersecurity threats, trust has become a scarce and increasingly valued commodity. But how can we trust the solutions, software, or technology products we use when we continuously see countless new attacks and threats emerging?
While companies are already acting consistently against these threats, the end user is still far from achieving a security practice that is considered ideal.
Salomão gives us some tips on what can be done to avoid unsolicited or fraudulent messages, better known as SPAM and Phishing:
– Pay attention to the visual appearance and quality of the email you receive. Sometimes the quality is so bad that you can easily see the email is not from a trusted source.
– Be aware of spelling and grammatical errors. Sometimes attackers do not master our language and use online translation platforms that compromise the quality of the translated text.
– Check links before clicking. Sometimes the links may be similar or may not even be related to the entity the attacker is trying to impersonate.
– Be careful with attachments. If they have extensions like EXE, COM, BAT, RAR, ZIP, URL, these are some of the most common extensions used by attackers that may contain malware or redirect to untrusted sites.
If you have been caught by a phishing campaign, you should act immediately.
– If you have entered a fake bank site and provided personal details, contact the bank immediately to block your account and cards if credit card details were provided.
– Update passwords as soon as possible to a new secure password.
– If you have clicked on malware, check your computer or mobile device with an up-to-date antivirus.
– In case you have a leak of sensitive business data, you should quickly contact your company’s IT department and cybersecurity team.