{"id":4891,"date":"2022-02-05T14:59:35","date_gmt":"2022-02-05T14:59:35","guid":{"rendered":"https:\/\/www.allieddigital.net\/us\/?p=4891"},"modified":"2023-07-20T11:56:30","modified_gmt":"2023-07-20T11:56:30","slug":"no-time-for-napping","status":"publish","type":"post","link":"https:\/\/www.allieddigital.net\/us\/blogs\/no-time-for-napping\/","title":{"rendered":"No time for napping. Someone\u2019s phishing!"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-4892 lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" alt=\"\" width=\"300\" height=\"200\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" data-src=\"https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/phishing-scam-fraud-identity-theft-300x200.jpg\" data-srcset=\"https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/phishing-scam-fraud-identity-theft-300x200.jpg 300w, https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/phishing-scam-fraud-identity-theft-1024x683.jpg 1024w, https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/phishing-scam-fraud-identity-theft-768x512.jpg 768w, https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/phishing-scam-fraud-identity-theft-1536x1024.jpg 1536w, https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/phishing-scam-fraud-identity-theft-2048x1365.jpg 2048w\"><\/p>\n<p class=\"reader-text-block__paragraph\">The year 2021 witnessed a rise in phishing attacks that targeted consumers. While the trends were erratic, multiple spikes in activity have made phishing a popular mode of attack on the threat landscape. These threat proponents utilize a plethora of tactics to target organizations and the primary mode of target continues to remain email.<\/p>\n<p class=\"reader-text-block__paragraph\">A report by\u00a0<a href=\"https:\/\/www.securitymagazine.com\/articles\/96430-mobile-phishing-threats-surged-161-in-2021#:~:text=Lookout%20research%20indicates%20that%20organizations,the%20second%20half%20of%202020.\">Lookout, Inc<\/a>. indicated mobile phishing exposure surged 161% within the energy industry between the 2nd of \u201820 and the 1st half of \u201821.\u00a0The financial services sector witnessed a 125% surge in exposure to mobile phishing attacks in 2020.<\/p>\n<p class=\"reader-text-block__paragraph\">According to<a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">\u00a0Verizon\u2019s 2021 Data Breach Investigations Report (DBIR)<\/a>, phishing is the top \u201caction variety\u201d seen in breaches in the last year and 43% of breaches involved phishing and\/or pretexting.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-4893 lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" alt=\"\" width=\"300\" height=\"199\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" data-src=\"https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/hacker-2021-08-31-16-05-00-utc-min-300x199.jpg\" data-srcset=\"https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/hacker-2021-08-31-16-05-00-utc-min-300x199.jpg 300w, https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/hacker-2021-08-31-16-05-00-utc-min-1024x679.jpg 1024w, https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/hacker-2021-08-31-16-05-00-utc-min-768x509.jpg 768w, https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/hacker-2021-08-31-16-05-00-utc-min-1536x1018.jpg 1536w, https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/hacker-2021-08-31-16-05-00-utc-min-2048x1357.jpg 2048w\"><\/p>\n<p class=\"reader-text-block__paragraph\"><strong>How businesses get attacked<\/strong><\/p>\n<ul>\n<li>Company Impersonation: A popular form of phishing is where the hackers impersonate the brand and use an email connected to a similar sounding domain. Businesses cannot be preemptive as one doesn\u2019t know about it till there is a victim who complains of a possible attack.<\/li>\n<li>Spear Phishing: This is like an impersonation mode but includes a few details about the target. This makes it more compelling for more victims into their trap.<\/li>\n<li>Email Takeovers: Senior executives are vulnerable in such cases. Scammers use email credentials and potential targets include employees and customers.<\/li>\n<li>Phone Phishing using VoIP impersonate company representatives while using personal details about potential targets.<\/li>\n<\/ul>\n<p class=\"reader-text-block__paragraph\">The rise in attacks can also be attributed to several targets emerging of late such as cryptocurrency exchanges, online gaming sites, and various online retailers.<\/p>\n<p class=\"reader-text-block__paragraph\"><strong>How can companies protect themselves against phishing?<\/strong><\/p>\n<ul>\n<li>Employee training sessions using mock phishing scenarios.<\/li>\n<li>Systems need to be updated with the latest <a href=\"https:\/\/www.allieddigital.net\/us\/cyber-security-main\/\">cybersecurity<\/a> patches.<\/li>\n<li>Antivirus solutions coupled with scheduled signature updates.<\/li>\n<li>Email filters should be deployed that detect Spam, blank senders, blacklisted domains, viruses, amongst others. Web filters can be used to block malicious websites.<\/li>\n<li>Organization-wide Strong Password security with multi-factor authentication<\/li>\n<li>A comprehensive security policy covering all potential clinks and susceptible areas under threat.<\/li>\n<li>Sensitive company data must be encrypted during transmission and storage.<\/li>\n<\/ul>\n<p class=\"reader-text-block__paragraph\">Spikes in phishing attacks throughout the year indicate Q1-2022 will likely continue to trend up. To protect enterprises from these threats, security teams should invest in resources to proactively detect attacks originating from a broad variety of methods.<\/p>\n<p class=\"reader-text-block__paragraph\">Allied Digital is a leading IT services player with services that cover cloud computing, AI, systems integration and cybersecurity. With a presence in 70 countries, it serves organizations across multiple industries keeping the operating environment secured while handling and eliminating all types of possible threats.<\/p>\n<p class=\"reader-text-block__paragraph\"><em>The author Sunil Bhatt is Chief Technology Officer at Allied Digital Services. He firmly believes that \u201cCybercriminals are fishing everywhere with smarter baits. Don\u2019t get hooked\u201d.<\/em><\/p>\n<p class=\"reader-text-block__paragraph\"><em>\u00a0<\/em><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<\/p>\n<p class=\"reader-text-block__paragraph\">The year 2021 witnessed a rise in phishing attacks<\/p>\n","protected":false},"author":1,"featured_media":4892,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[],"class_list":["post-4891","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>No Time for Napping - Cyber Phishing Attacks and its Protection | Allied Digital Blogs<\/title>\r\n<meta name=\"description\" content=\"To protect enterprises from phishing threats, security teams should invest in resources to proactively detect attacks originating from a broad variety of methods.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.allieddigital.net\/us\/blogs\/no-time-for-napping\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"No Time for Napping - Cyber Phishing Attacks and its Protection | Allied Digital Blogs\" \/>\r\n<meta property=\"og:description\" content=\"To protect enterprises from phishing threats, security teams should invest in resources to proactively detect attacks originating from a broad variety of methods.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.allieddigital.net\/us\/blogs\/no-time-for-napping\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Allied Digital Home\" \/>\r\n<meta property=\"article:published_time\" content=\"2022-02-05T14:59:35+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2023-07-20T11:56:30+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/phishing-scam-fraud-identity-theft-scaled.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\r\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"admin\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:title\" content=\"No Time for Napping - Cyber Phishing Attacks and its Protection | Allied Digital Blogs\" \/>\r\n<meta name=\"twitter:description\" content=\"To protect enterprises from phishing threats, security teams should invest in resources to proactively detect attacks originating from a broad variety of methods.\" \/>\r\n<meta name=\"twitter:image\" content=\"https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/phishing-scam-fraud-identity-theft-scaled.jpg\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"No Time for Napping - Cyber Phishing Attacks and its Protection | Allied Digital Blogs","description":"To protect enterprises from phishing threats, security teams should invest in resources to proactively detect attacks originating from a broad variety of methods.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.allieddigital.net\/us\/blogs\/no-time-for-napping\/","og_locale":"en_US","og_type":"article","og_title":"No Time for Napping - Cyber Phishing Attacks and its Protection | Allied Digital Blogs","og_description":"To protect enterprises from phishing threats, security teams should invest in resources to proactively detect attacks originating from a broad variety of methods.","og_url":"https:\/\/www.allieddigital.net\/us\/blogs\/no-time-for-napping\/","og_site_name":"Allied Digital Home","article_published_time":"2022-02-05T14:59:35+00:00","article_modified_time":"2023-07-20T11:56:30+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/phishing-scam-fraud-identity-theft-scaled.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"No Time for Napping - Cyber Phishing Attacks and its Protection | Allied Digital Blogs","twitter_description":"To protect enterprises from phishing threats, security teams should invest in resources to proactively detect attacks originating from a broad variety of methods.","twitter_image":"https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/phishing-scam-fraud-identity-theft-scaled.jpg","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.allieddigital.net\/us\/blogs\/no-time-for-napping\/#article","isPartOf":{"@id":"https:\/\/www.allieddigital.net\/us\/blogs\/no-time-for-napping\/"},"author":{"name":"admin","@id":"https:\/\/www.allieddigital.net\/us\/#\/schema\/person\/3b5e910de8aa22a972d13e3a87805a5c"},"headline":"No time for napping. Someone\u2019s phishing!","datePublished":"2022-02-05T14:59:35+00:00","dateModified":"2023-07-20T11:56:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.allieddigital.net\/us\/blogs\/no-time-for-napping\/"},"wordCount":459,"commentCount":0,"image":{"@id":"https:\/\/www.allieddigital.net\/us\/blogs\/no-time-for-napping\/#primaryimage"},"thumbnailUrl":"https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/phishing-scam-fraud-identity-theft-scaled.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.allieddigital.net\/us\/blogs\/no-time-for-napping\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.allieddigital.net\/us\/blogs\/no-time-for-napping\/","url":"https:\/\/www.allieddigital.net\/us\/blogs\/no-time-for-napping\/","name":"No Time for Napping - Cyber Phishing Attacks and its Protection | Allied Digital Blogs","isPartOf":{"@id":"https:\/\/www.allieddigital.net\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.allieddigital.net\/us\/blogs\/no-time-for-napping\/#primaryimage"},"image":{"@id":"https:\/\/www.allieddigital.net\/us\/blogs\/no-time-for-napping\/#primaryimage"},"thumbnailUrl":"https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/phishing-scam-fraud-identity-theft-scaled.jpg","datePublished":"2022-02-05T14:59:35+00:00","dateModified":"2023-07-20T11:56:30+00:00","author":{"@id":"https:\/\/www.allieddigital.net\/us\/#\/schema\/person\/3b5e910de8aa22a972d13e3a87805a5c"},"description":"To protect enterprises from phishing threats, security teams should invest in resources to proactively detect attacks originating from a broad variety of methods.","breadcrumb":{"@id":"https:\/\/www.allieddigital.net\/us\/blogs\/no-time-for-napping\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.allieddigital.net\/us\/blogs\/no-time-for-napping\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.allieddigital.net\/us\/blogs\/no-time-for-napping\/#primaryimage","url":"https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/phishing-scam-fraud-identity-theft-scaled.jpg","contentUrl":"https:\/\/www.allieddigital.net\/us\/wp-content\/uploads\/2022\/03\/phishing-scam-fraud-identity-theft-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.allieddigital.net\/us\/blogs\/no-time-for-napping\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.allieddigital.net\/us\/"},{"@type":"ListItem","position":2,"name":"No time for napping. Someone\u2019s phishing!"}]},{"@type":"WebSite","@id":"https:\/\/www.allieddigital.net\/us\/#website","url":"https:\/\/www.allieddigital.net\/us\/","name":"Allied Digital Home","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.allieddigital.net\/us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.allieddigital.net\/us\/#\/schema\/person\/3b5e910de8aa22a972d13e3a87805a5c","name":"admin","sameAs":["https:\/\/www.allieddigital.net\/us\/"],"url":"https:\/\/www.allieddigital.net\/us\/blogs\/author\/admin_website\/"}]}},"_links":{"self":[{"href":"https:\/\/www.allieddigital.net\/us\/wp-json\/wp\/v2\/posts\/4891","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.allieddigital.net\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.allieddigital.net\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.allieddigital.net\/us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.allieddigital.net\/us\/wp-json\/wp\/v2\/comments?post=4891"}],"version-history":[{"count":3,"href":"https:\/\/www.allieddigital.net\/us\/wp-json\/wp\/v2\/posts\/4891\/revisions"}],"predecessor-version":[{"id":5581,"href":"https:\/\/www.allieddigital.net\/us\/wp-json\/wp\/v2\/posts\/4891\/revisions\/5581"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.allieddigital.net\/us\/wp-json\/wp\/v2\/media\/4892"}],"wp:attachment":[{"href":"https:\/\/www.allieddigital.net\/us\/wp-json\/wp\/v2\/media?parent=4891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.allieddigital.net\/us\/wp-json\/wp\/v2\/categories?post=4891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.allieddigital.net\/us\/wp-json\/wp\/v2\/tags?post=4891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}