Fishing for thoughts
Phishing attacks give the user a message to solicit a specific response, there are several types of phishing attempts. These types are called Spear Phishing, Whaling, and Clone Phishing.
You can spot these attacks by emails asking you to put down information or asking you to click on the link, which asks you for information.
You can prevent this from happening by: remove/quarantine attachments with malicious intent from reaching users, URLs, disallowing weak passwords, recurring passwords, and going to two-step verification.
Here is an example of recent phishing attempts.
Services Find documentation, instructions, and information on LTS services Help Contact the Help Desk; review options…lts.lehigh.edu
Credential Reuse is another commonly used cyber attack. It’s a hacking strategy where the hackers hope that a person reuses a password for everything, making it easier to attack.
You can probably tell if you hacked if you find out 1 of your accounts got hacked. The problem with using the same password multiple times, makes it an “easy one key unlocks all scenario.”
The way to prevent this is easy! All you have to do is USE DIFFERENT PASSCODES for your accounts.
Recent Credential Reuses are the following.
Dropbox disclosed earlier this week that a large chunk of its users' credentials obtained in 2012 was floating around…techcrunch.com
REMEMBER ONLY YOU CAN PREVENT YOURSELF FROM BEING HACKED EASILY!