It is not just emails that are used as a point of access
Although the use of email for the purposes of phishing is very common, it is not the only source; SMS messages, phone calls and instant messages can also be used to this end. Bearing in mind that malicious communications are progressively more difficult to detect, make sure that both you and your team are asking yourselves these questions before taking action:
- Were you expecting the message?
- Do you know the sender?
- Are you being asked to click on a link, share information or download a file?
If in doubt, verify the information with a trusted source, such as an official website or telephone number stored in your list of contacts. If you fail to verify the information, report it.
Infographic: How to detect phishing