Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

What Is SMiShing?
SMiShing is a mobile variant of phishing that involves the use of a text message, rather than an email, to catch the target in the phisher’s net. These attacks are highly reliant on the target’s compliance with the instructions the cybercriminal provides, as well.

These attacks can be more effective than the typical phishing attack, as the general public is increasingly aware of cyber threats--yet don’t expect these threats to manifest in their cell phone.

Just as one would experience in the ‘typical’ phishing attack, a ‘smisher’ will likely try to gain your trust in order to extract credentials. This ultimately allows them access to the accounts they obtained the credentials for, permitting them to wreak havoc and/or steal what they please. This is especially dangerous if they gain access to any client financial information you may have on file. Alternatively, some smishers will claim that if you don’t access a link and enter your personal information, that you will be charged daily for some service. Naturally, if this service is one that your organization has not signed up for, this message should be reported to IT and then disregarded.

How To Spot SMiShing Scams
First, if you suspect that a message is fraudulent, it never hurts to reach out to confirm that the message was sent by who it seems to have been. To do so, reach out via a different channel than your text, such as calling an official service number to speak directly to a representative. This allows you to confirm that the message was legitimate or fraudulent without exposing yourself or the business to greater risk.

In essence, avoid responding to text messages from senders that you don’t know--especially when the number is a 5000 number. This indicates that the message was actually an email sent as a text message, which is often a tactic used by scammers.

Finally, keep an eye out for any messages that contain downloadable apps. These are a favorite method to introduce malware to a mobile device. If an app doesn’t come from an official app store, it is likely a piece of disguised malware.

How To Be The Most Safe
If in doubt, confirm before you answer. Additionally, a VPN (or virtual private network) can help you maintain your mobile security, especially when paired with the practices outlined above.

BNMC can help you to put these safeguards, and others, in place for your business devices. Give us a call at 978-482-2020 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 19 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Email Privacy Malware Hackers Business Computing Hosted Solutions Ransomware Internet Microsoft Software Windows Google Network Security Computer Business Smartphone Windows 10 IT Services Backup App Hardware Business Continuity Innovation Data Saving Money Productivity Small Business Cloud Computing Mobile Devices Phishing IT Support Data Management Internet of Things User Tips Android Tip of the week Remote Monitoring Artificial Intelligence Word Settings Cybersecurity Robot Google Drive Gmail Office Tips Data Recovery Upgrade Browser Big Data Managed IT Services Smartphones Facebook Data storage Efficiency Vulnerability Save Money Office 365 Analytics Risk Management IT Management Telephone Systems Miscellaneous Alert Network Encryption Virtual Private Network Apple SaaS Chrome Server Productivity Hosted Solution Workplace Tips Antivirus YouTube IT Support Social Media communications End of Support Unified Threat Management Managed IT Services Disaster Recovery Passwords Outsourced IT Windows 10 Microsoft Office LiFi Managed Service Provider Administration Money Content Filtering Mobile Device Outlook Monitors WannaCry Budget Typing Networking Google Maps Humor Automation Current Events Running Cable Servers Buisness VPN Data loss Mouse Cryptocurrency Virtual Desktop Data Security Virtual Reality Server Management desktop Communication Going Green Laptop Deep Learning Digital Politics Collaboration Bitcoin Techology Quick Tips Firewall Storage Statistics Writing Printing Samsung Spam Bring Your Own Device Downtime Mail Merge Spyware Legal Dark Data File Sharing Windows 8 Unified Threat Management VoIP Bluetooth Solid State Drive Retail Gadgets Address Employer-Employee Relationship Websites Customer Service Bandwidth Avoiding Downtime Halloween Hard Disk Drive Office Users Computing Apps Data Backup Vendor Management Operating System Social Education Time Management Cabling Scary Stories Search Social Engineering Information Technology Best Practice Website Emergency How To Network Management Infrastructure Sports Safety Unified Communications Business Technology Firefox Digital Payment Google Docs Network Congestion Hacks The Internet of Things Touchscreen Disaster Managed IT Maintenance Google Wallet Business Growth Lenovo VoIP Uninterrupted Power Supply Computers Password WiFi Cybercrime Shortcut IBM Marketing Computer Care Drones Hacker Superfish Wireless Display Patch Management Corporate Profile Training Automobile Alt Codes Scam Customer Relationship Management Dell IT solutions Heating/Cooling Staffing Administrator Electronic Medical Records what was your? Web Server Processors Twitter Upgrades GPS Holiday Business Management Cameras Remote Computing 3D Printing Tracking CCTV Unsupported Software Document Management Tech Support Update Notifications Mobile Data Identity Theft Travel User Error Recovery G Suite Crowdsourcing CrashOverride Supercomputer Botnet Motion Sickness Chromebook Taxes Government Physical Security IT Budget Machine Learning Emoji IT Consultant BYOD Personal Information Relocation Meetings Cortana Cleaning Work/Life Balance Wi-Fi Private Cloud Webcam Virtualization Law Enforcement Error Computer Repair Ben McDonald shares Point of Sale Mobile Device Management How To Gadget Health Paperless Office Mobile Computing Black Market

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3