You are a target!
Cybercriminals are quite effective at getting what they want. They’ve learned that the easiest way around your organization’s defenses isn’t hacking and cracking, it’s tricking you into letting them in.
Digital Attacks
Phishing: Email-based social engineering targeting an organization.Spear Phishing: Email-based social engineering targeting a specific person or role.
Stop, look, and think before you click that link or open that attachment.
In-Person Attacks
Tailgating: When a hacker bypasses physical access controls by following an authorized person inside.
Stop, look, and think before allowing someone in that you don’t recognize or plugging any external media into your computer.
Phone Attacks
Vishing: Over-the-phone-based social engineering.
Stop, look, and think before you surrender confidential information or take action on an urgent request.
Social Engineering
Social engineering is the art of manipulating, influencing, or deceiving you into taking some action that isn’t in your own best interest or in the best interest of your organization.
The goal of social engineers is to obtain your trust, then exploit that relationship to coax you into either divulging sensitive information about yourself or your organization or giving them access to your network.
Red Flags
Red flags are a sign of danger or a problem. They can be as subtle as an uneasy feeling or as obvious as an email about “suspicious charges” from a bank that you don’t even have an account with. Pay attention to these warning signs as they can alert you to a social engineering attack!Printable PDF
Credit: KnowBe4.com
Enjoy Save QR Scanning
Do not let cybercriminals rob you of the convenience of using QR codes. Keep yourself secure by following these tips:
Use the built-in QR code scanner in your device’s app.
If your device does not have a built-in scanner, only download a trusted third-party scanning app from your device’s official app store.Check for physical tampering before you scan.
Cybercriminals can generate malicious QR codes and print them as stickers to cover up legitimate ones.Review the link displayed on your device’s scanning app before you click.
Look for spelling errors, misplaced characters, and shortened web addresses, which are signs of a malicious website.Never enter sensitive information into a website where you are directed by a QR code unless you are certain the site is legitimate.
Always ask an employee to verify any QR codes posted in or around a business, and never scan QR codes placed in random locations.
Stay alert and think before scan to avoid falling victim to a cybercriminal’s attack.
Printable PDF
Credit: KnowBe4.com
The Dangers of AI and Deepfakes
What are AI Art and Deepfakes?
AI art is generated using billions of images and examples of art. When you enter a prompt, the AI art generator builds an image for you by combining many of these examples into a single image. Deepfake technology is similar, but it involves manipulating real photographs and videos of people and places. This technology can make it look like a person did or said something that they never did. Both of these technologies can be used in a harmless way, but cybercriminals have learned to use them maliciously.
Deepfake Scams
Scammers can use deepfake technology to impersonate celebrities or other public figures. This type of scam can make it seem like a celebrity has endorsed a product even though they have not. Scammers use this technique to trick people into purchasing a fake product, and they will steal consumers’ personal or financial information. Deepfakes can be used for political figures as well. A deepfake video can make it appear that a government official said or did something that they didn’t say or do. These types of videos can be used to lure people into visiting fake websites or clicking on fake news articles.
AI-Generated Art and Photograph Scams
Cybercriminals commonly use AI in online romance scams. They can generate fake photographs to use in dating profiles to try and steal money or information from their victims. The cybercriminals will also use current events as the subject of their scams. They use AI to create realistic photographs of tragedies and other events. They post the photographs on fake websites to coerce people into donating money to a charity organization. The organization is fake, of course, and the cybercriminals will keep any donated money.
What Can I Do to Stay Safe?
Follow the tips below to keep yourself safe from AI art scams:
- AI-generated images often have subtle differences or mistakes. Keep an eye out for anything in the photograph that appears to be unusual. A hand with more than five fingers or a photograph with strange lighting or shadows are common signs that an image was created with AI.
- Always stop and think before clicking or taking action. If a photograph or image seems bizarre or too good to be true, it could be a scam.
- When possible, verify the claim in a different location. For example, if you see a video with a celebrity endorsement, check that person’s official website for proof that they are actually involved with the product.
Printable PDF
Get Out and Vote Phishing Scam
Multiple reports this week are warning Americans about a new phishing scam.
- It arrives via text message, informing recipients that they are not registered to vote.
- This fake website votewin[.]org asks visitors to supply their personal information for pre-checking prior to sign-up.
- Officials have stated that this scam violates one of the tenants of election outreach, which is to never tell the recipient what their voter status may be.
Multi-Stage Vishing
Look Out for this Two-Step Cyberattack!
Vishing or “voice phishing” is when a cybercriminal tries to convince you to give sensitive information over the phone. Typical vishing involves only a phone call. But scammers are now combining emails and phone calls to better trick their targets.
Here is how it works:
- The Setup
You receive an email claiming that you’ve purchased an item or authorized a payment. You’re encouraged to call a phone number if you did not initiate the transaction. - The Takedown
You call the provided number, and a helpful agent agrees to provide a refund or cancel the transaction. They just need your credit card information or banking details. After you supply the information, your bank account is emptied, or your credit card is used for fraudulent purchases.
What can you do?
Look for these red flags. If you see any, it’s probably a scam!
- Generic email address
- You didn’t make the transaction
- You’re asked to do something you’ve never been asked before
- Pressure to respond
Never call the number in a suspicious email, even if you do business with the referenced organization! Call the Customer Service number on the organization’s website and ask about the transaction described in the email.
Printable PDF
credit: KnowBe4.com
How Secure is Your Mobile Device?
Most of us have a smartphone, but how many of us really think about the security threats faced by these mobile devices? Mobile devices are vulnerable to many different types of threats. Scammers are increasing their attacks on mobile devices and targeting your phone using malicious applications. Using these methods, they can steal personal and business information without you having any idea what’s going on.
Even if you’ve downloaded a security or antivirus application, securing your smartphone goes beyond these services. Improving your mobile security practices is your best defense against the privacy and security issues associated with your mobile device.
How can I improve my mobile security practices?
Always remember these best practices to minimize the risk of exploits to your mobile devices:
- Ensure your phone’s operating system is always up to date. Operating systems are often updated in order to fix security flaws. Security flaws that remain unfixed due to an out-of-date operating system cause many malicious threats.
- Watch out for malicious apps in your app store. Official app stores regularly remove applications containing malware, but sometimes these dangerous apps slip past and can be downloaded by unsuspecting users. Do your research, read reviews and pay attention to the number of downloads it has. Never download applications from sources other than official app stores.
- Ensure applications are not asking for access to things on your phone that are irrelevant to their function. Applications usually ask for a List of permissions to files, folders, other applications, and data before they're downloaded. Do not blindly approve these permissions. If the permission requests seem unnecessary, look for an alternative application in your app store.
- No password or weak password protection. Many people still don't use a password to lock their phone. If your device is lost or stolen, thieves will have easy access to all of the information stored on your phone.
- Be careful with public Wi-Fi. Scammers use technology that lets them see what you're doing. Avoid logging in to your online services or performing any sensitive transactions (such as banking) over public Wi-Fi.