KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How To Spot A SMiShing Attempt

How To Spot A SMiShing Attempt

Phishing--it’s a threat that tells a tantalizing lie to entrap its target, and one that you’ve likely heard of before. However, as technology has advanced, so have the opportunities that cybercriminals have to leverage phishing attempts. Smartphones, for instance, make it so that you must be aware and on the lookout for SMiShing scams.

SMiShing?
SMiShing is the mobile version of phishing. Instead of catching the target with an email message, SMiShing attempts are sent via SMS, or text. Other than the method of introduction, there is little difference between SMiShing and the traditional phishing. For instance, both require the target to take the phisher (or, in the case of SMiShing, ‘smisher’) at their word and comply with any instructions.

Despite the general public learning to be more wary of cyber threats that come through the computer, there is still a lack of anticipation that these threats can also come in via cell phone. SMiShing is meant to use the disguise of a familiar contact to steal credentials and data, or delete it entirely.

A “smisher” will use any stolen credentials to access the user’s accounts and cause all sorts of chaos for them. For example, if you have any sensitive client information located on-site or stored in an online account, hackers can gain access to it with your credentials. Another way that a smisher might take advantage of you is by sending you a fake link via an SMS and request that you authenticate yourself or face a recurring fee. If this is the case, you should report the attempt to IT and give the smisher no response.

Spotting a SMiShing Scam
The first thing you should do if you receive a message that you suspect is part of a SMiShing attempt is to reach out to the supposed sender to confirm that it was legitimate. This should be done via some means other than text. Calling the contact or one of their representatives can help you to judge if the message is authentic or not without leaving yourself vulnerable to further threats.

It more or less boils down to leaving SMS messages from unknown senders alone. This is especially true of ‘5000’ numbers, which indicate that the message was originally an email sent as a text. Scammers have been known to use this tactic in their schemes.

Furthermore, messages with downloadable applications are another warning sign, as this is a common method of infecting a mobile device with malware. A good rule of thumb is to only download and utilize apps that come from your mobile device’s official marketplace, as those that don’t are very likely to turn out to be malware in disguise.

How To Protect Yourself
As mentioned above, if there is any doubt about the validity of a message, confirm its authenticity through an alternative line of communication. For added security, it helps to augment the practices we’ve outlined here with the use of a virtual private network, or VPN, safeguarding your mobile activity.

For help in securing your business devices and communications, call KT Connections at 605-341-3873.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 21 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Email Internet Business Computing Cloud malware hackers Google Network Security software Efficiency Data Backup Ransomware Business User Tips Microsoft Mobile Device Management IT Support Managed IT Services Computer Android Productivity IT Support Network Smartphone Small Business Windows Hosted Solutions Business Continuity Data Management Mobile Devices Operating System Windows 10 Money Cloud Computing Facebook Hardware Outsourced IT Unified Communications security cameras Social Media Disaster Recovery Internet of Things Gmail Business Management Passwords End of Support data breach Apple VoIP BDR Encryption Microsoft Office Outlook Antivirus Alert IT Management Phishing Data storage Bandwidth IT Services communications Upgrade Windows 10 security solutions WiFi Server Firewall YouTube IoT Best Practice Productivity Drones History Nextiva Scam Spam Customer Service Communication vulnerability Lunch and Learn Search IBM Data Recovery Innovation Google Maps Managed IT Services Politics Law Enforcement Robot cybersecurity Smartphones App Save Money Start Menu Saving Money SaaS Data Backup Information Technology Automation Artificial Intelligence Events Networking Word Big Data Event Marketing The Internet of Things Local Buzz Apps Google Wallet BYOD South Dakota Hard Drive Legal Vendors Flash Lawyers Virtual Machines IT Strategy Local Technology Monitors Workers Physical Security enterprise productivity software Emergency IoT Devices Business Security How To Sports Internet 101 Hosted Solution Tips and Tricks Community Involvement Collaboration Wireless Technology Settings IT Solutions Risk Creep Administration Sales Tax Displays Communications Samsung face LiFi Business Technology password manager LastPass Printing Time Management Internet Connected Devices Download Society Streaming Media Attorneys IT for Oil Companies Workplace Tips Disaster Laptop Phone System Tablets surveillance cameras Proactive IT Remote Monitoring Visible Light Communication Fast food user confidence Content Filtering Bluetooth Unified Threat Management Quick Tips healthcare Windows 8 Windows XP Managed Services Risk Management Office Tips Tablet Hardware as a Service Trend Micro Music Website Managed IT Compliance Safety AtomBombing tool Tech Support Kaseya Government Knowledge SOX Writing HaaS Google Play Store Advertising LastPass Browser Business Comunications appointment Press Release Information Security Printer Virtual Desktop communication device VPN Kaseya Connect Virtual Reality Tech Terms Sarbanes-Oxley Act Vendor Mangement Black Market Computer Care Touchscreen Office 365 Digital Email Security Document Management Webcam business owner Conference Access Control End User Testing botnet attack Retail Business Mangement Running Cable camera Chamber of Commerce Cryptocurrency Memory Websites Uninterrupted Power Supply Penetration Testing Microsoft Bookings Access Remote Computing communication solutions Patch Management News vulnerabilities Data Security botnet Cabling macbook Business Growth Cleaning Virtualization Hack identity theft Software as a Service Data Protection Network Congestion Phishing Scams booking process Deep Learning Spyware Hacking Redundancy Dell ’s Sonicwall Global Management System Audit DDoS attacks Microsoft Office 365 Google Drive Update Event media experience Virus Corporate Profile IT Consultation Solid State Drive Office Analytics Project Management Programming Social Password Maintenance Microsoft Office 365 features Telephony Worker DDoS Rebrand Mixer information Law IT Cloud Backup security precautions Gadgets Google Docs IT Assessment Vendor Management Cache File Sharing Education Managed Service Provider Rapid City Fortinet Experience VoIP Web Servers Applications security solution Users Unified Threat Management Phone Systen Notifications Documents Social Engineering Business Metrics end-of-support date holiday season CCTV Text Messaging PDF Rental Service Chromebook IT service Web Server UTM Computing Flexibility CrashOverride holidays Downloads Meetings Cortana Mobility Ordinary Computers Threat management Language Reliable Computing scammers Emails Twitter Tracking quantum computers Distributed Denial of Service Miscellaneous Scalability Marketing scams G Suite Supercomputer Processors Computer Malfunction Travel Employer-Employee Relationship Telephone Systems Sync Messenger IT Consultant Microchip network security professionals Private Cloud Health Banking In Internet of Things Books Training Playbook Motion Sickness Budget 3D Printing Reading Employer Employee Relationship Machine Learning Digital Payment Hiring/Firing breach methods Cost Management Bring Your Own Device Administrator Relocation Public Cloud Hacker Taxes Work/Life Balance base infrastructure Hacks Paperless Office Wi-Fi Automobile collaboration capabilities Holiday