Phishing involves an email or message that appears to be from a reliable source. The attacker sends a message with a link or attachment that can install malware or steal login credentials when clicked.
Baiting attacks involve offering something of value, such as a free download or gift card, in exchange for sensitive information.
Pretexting attacks involve creating a false scenario to gain access to sensitive information. For example, a cybercriminal could imitate as an IT technician and ask for login credentials.
Tailgating attacks involve following someone into a secure area without proper authorization.
Watering hole attacks involve compromising a website that is frequently visited by a target group of individuals. The attackers then use the compromised website to distribute malware or steal sensitive information.
Vishing attacks involve using voice communication, such as a phone call, to trick individuals into divulging sensitive information.
- Verify the sender's identity - Avoid clicking on suspicious links - Report any suspicious activity to the appropriate authorities. - Avoid sharing sensitive information