Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

What Is SMiShing?
SMiShing is a mobile variant of phishing that involves the use of a text message, rather than an email, to catch the target in the phisher’s net. These attacks are highly reliant on the target’s compliance with the instructions the cybercriminal provides, as well.

These attacks can be more effective than the typical phishing attack, as the general public is increasingly aware of cyber threats--yet don’t expect these threats to manifest in their cell phone.

Just as one would experience in the ‘typical’ phishing attack, a ‘smisher’ will likely try to gain your trust in order to extract credentials. This ultimately allows them access to the accounts they obtained the credentials for, permitting them to wreak havoc and/or steal what they please. This is especially dangerous if they gain access to any client financial information you may have on file. Alternatively, some smishers will claim that if you don’t access a link and enter your personal information, that you will be charged daily for some service. Naturally, if this service is one that your organization has not signed up for, this message should be reported to IT and then disregarded.

How To Spot SMiShing Scams
First, if you suspect that a message is fraudulent, it never hurts to reach out to confirm that the message was sent by who it seems to have been. To do so, reach out via a different channel than your text, such as calling an official service number to speak directly to a representative. This allows you to confirm that the message was legitimate or fraudulent without exposing yourself or the business to greater risk.

In essence, avoid responding to text messages from senders that you don’t know--especially when the number is a 5000 number. This indicates that the message was actually an email sent as a text message, which is often a tactic used by scammers.

Finally, keep an eye out for any messages that contain downloadable apps. These are a favorite method to introduce malware to a mobile device. If an app doesn’t come from an official app store, it is likely a piece of disguised malware.

How To Be The Most Safe
If in doubt, confirm before you answer. Additionally, a VPN (or virtual private network) can help you maintain your mobile security, especially when paired with the practices outlined above.

Telesys Voice and Data can help you to put these safeguards, and others, in place for your business devices. Give us a call at (800) 588-4430 to get started.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Wednesday, 18 July 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Privacy Malware Business Computing Productivity Business Email Microsoft Internet Hosted Solutions Windows 10 Software Backup Managed Service Provider Computer Ransomware IT Services Network Security Mobile Devices Android Smartphone User Tips Managed IT services Social Media Google IT Support Workplace Tips Outsourced IT Hardware Browser Communication Business Continuity Efficiency Disaster Recovery Data Backup App Smartphones Innovation Data Management Small Business Office Business Management Upgrade Data Cloud Computing Holiday Internet of Things Facebook Data Recovery Remote Monitoring Server Office 365 Miscellaneous WiFi Windows Microsoft Office Encryption Spam Artificial Intelligence Gmail Big Data Network Robot Apps Save Money Phishing Paperless Office Password Hosted Solution Recovery Productivity Bandwidth Firewall How To Content Filtering Government Customer Service Mobile Device Management Money Infrastructure Work/Life Balance Tech Term Saving Money Office Tips Remote Computing Tip of the week Employer-Employee Relationship Document Management Customer Relationship Management Risk Management Cybersecurity Chrome Passwords Word Unified Threat Management Managed IT Services Hacker Apple Avoiding Downtime Hacking Cybercrime Antivirus Mobile Computing Virtual Reality Tech Support Mobile Device Managed IT Data loss SaaS BYOD Social Operating System BDR Website Wi-Fi Windows 10 VoIP Business Growth Compliance Presentation Telephone Systems Two-factor Authentication File Sharing Settings Analytics Vendor Management Outlook Data Security The Internet of Things Applications Computers IT Support Alert Data storage Health Computing IT Management Education Computer Care Virtualization Administration Project Management Competition Training Safety IT solutions Business Technology Information Technology Tablet Wireless Technology Wireless Automobile Upgrades Budget Humor Downtime End of Support communications Analyitcs Mouse YouTube Unified Communications Patch Management Collaboration Legal Scam LiFi Regulations Vulnerability Specifications Twitter Politics Monitors VPN Travel Identity Theft Google Drive User Websites Automation Physical Security Augmented Reality Going Green Virtual Private Network Smart Technology Taxes Assessment IBM HIPAA Running Cable Server Management Retail Botnet Printing Best Practice Samsung Mobile Security Lithium-ion battery Licensing Bring Your Own Device Search Business Owner Maintenance Digital Payment Sports Storage IT service Cortana Marketing Quick Tips Printer PowerPoint Crowdsourcing Dark Data Cables IT Consulting Language Mobile Office Migration Black Friday Private Cloud Typing Drones Nanotechnology Dark Web Consumers Point of Sale WannaCry Data Breach Computing Infrastructure Time Management Access Control Buisness Wires Chatbots Cyber Monday Error Cabling Cryptocurrency Knowledge IoT Data Warehousing Technology Laws Alerts eWaste Network Management SharePoint Identity flu season IT Sevices Web Server VoIP Bitcoin Update Staffing Experience Utility Computing Lenovo Microsoft Excel Unified Threat Management Cooperation Environment Touchscreen Downloads 3D Printing Shortcut Fort Worth Administrator Disaster Cameras Digital Windows 8 Chromebook GPS Healthcare Superfish Blockchain Domains business communications systems Staff Troubleshooting Multi-Factor Security Law Enforcement Google Maps Network Congestion Unsupported Software 5G Entrepreneur flu shot Uninterrupted Power Supply CCTV Spyware Emoji Tracking Cost Management Application Permissions Public Speaking Internet Protocol Flexibility Google Calendar Phone System Gadget Users Display Mobile Data Hacks Fort Worth IT Solid State Drive How To Management Networking Fraud VoIP streamlines Operations Heating/Cooling Legislation Current Events Social Networking DFW IT Service Hard Disk Drive G Suite Firefox Processors Laptop Enterprise Resource Planning Hard Drives Net Neutrality business network infrastructure Wearable Technology Servers Virtual Desktop Motherboard Motion Sickness Supercomputer Halloween Google Docs Mobile Refrigeration Techology Internet Exlporer data services iPhone Software as a Service Help Desk Writing Deep Learning Personal Information Fun Router Mail Merge Distributed Denial of Service IT Consultant Consultation IT Budget Scary Stories Vulnerabilities Disaster Resistance User Error IT Technicians Statistics Technology Tips Machine Learning Social Engineering Computer Repair Modem Address Managed IT Service Meetings Cleaning Notifications Geography Undo Proactive IT Hotspot IP Address Mirgation Bluetooth Comparison Relocation Software Tips Alt Codes Electronic Medical Records Google Wallet Cookies Redundancy Break Fix Webcam Corporate Profile

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code