Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

What Is SMiShing?
SMiShing is a mobile variant of phishing that involves the use of a text message, rather than an email, to catch the target in the phisher’s net. These attacks are highly reliant on the target’s compliance with the instructions the cybercriminal provides, as well.

These attacks can be more effective than the typical phishing attack, as the general public is increasingly aware of cyber threats--yet don’t expect these threats to manifest in their cell phone.

Just as one would experience in the ‘typical’ phishing attack, a ‘smisher’ will likely try to gain your trust in order to extract credentials. This ultimately allows them access to the accounts they obtained the credentials for, permitting them to wreak havoc and/or steal what they please. This is especially dangerous if they gain access to any client financial information you may have on file. Alternatively, some smishers will claim that if you don’t access a link and enter your personal information, that you will be charged daily for some service. Naturally, if this service is one that your organization has not signed up for, this message should be reported to IT and then disregarded.

How To Spot SMiShing Scams
First, if you suspect that a message is fraudulent, it never hurts to reach out to confirm that the message was sent by who it seems to have been. To do so, reach out via a different channel than your text, such as calling an official service number to speak directly to a representative. This allows you to confirm that the message was legitimate or fraudulent without exposing yourself or the business to greater risk.

In essence, avoid responding to text messages from senders that you don’t know--especially when the number is a 5000 number. This indicates that the message was actually an email sent as a text message, which is often a tactic used by scammers.

Finally, keep an eye out for any messages that contain downloadable apps. These are a favorite method to introduce malware to a mobile device. If an app doesn’t come from an official app store, it is likely a piece of disguised malware.

How To Be The Most Safe
If in doubt, confirm before you answer. Additionally, a VPN (or virtual private network) can help you maintain your mobile security, especially when paired with the practices outlined above.

BNMC can help you to put these safeguards, and others, in place for your business devices. Give us a call at 978-482-2020 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 17 December 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Email Malware Hackers Business Computing Internet Microsoft Hosted Solutions Ransomware Software IT Services Business Computer Windows Google Network Security Windows 10 Backup Smartphone Small Business Business Continuity Data Management Browser Innovation Data Android App Hardware Data Recovery Tip of the week Managed IT Services Smartphones Internet of Things Outsourced IT Remote Monitoring User Tips Saving Money Office 365 Artificial Intelligence Productivity Mobile Devices Cloud Computing Phishing IT Support Cybersecurity Robot Google Drive Gmail IT Support Office Tips Upgrade Big Data Facebook Managed Service Provider Data storage Money Efficiency Risk Management Word Settings Productivity Computing Employer-Employee Relationship YouTube communications Social Media End of Support Windows 10 Government Disaster Recovery Unified Threat Management Managed IT Services Passwords Maintenance Vulnerability LiFi Microsoft Office Administration Content Filtering Outlook IT Management Monitors Save Money Virtual Private Network Analytics Mobile Device Mouse Miscellaneous Network Telephone Systems Apple Encryption SaaS Alert Antivirus Firewall Data Backup Chrome Hosted Solution Server Workplace Tips Websites Apps Halloween Cyber Monday Office Users Vendor Management Business Technology Operating System Education Hard Disk Drive SharePoint Touchscreen Social Information Technology Scary Stories Smart Technology Social Engineering Managed IT Cabling Lenovo Best Practice Website Downloads Shortcut Unified Communications How To Sports Distributed Denial of Service Safety Infrastructure Superfish Google Docs The Internet of Things Two-factor Authentication Network Congestion BYOD Hacks Patch Management Google Wallet Firefox Managed IT Service Digital Payment Disaster VoIP Scam Customer Relationship Management Business Growth WiFi Cybercrime Multi-Factor Security Computers Heating/Cooling Password Marketing Drones Break Fix Uninterrupted Power Supply Networking Hacker IBM Google Calendar Computer Care Display Servers VPN Dark Web Wireless Data Security Alt Codes IT solutions Corporate Profile Legislation Training Server Management Automobile Budget Microsoft Excel Dell Techology Humor Quick Tips Typing Current Events WannaCry Running Cable Tablet Automation Statistics Mail Merge Buisness Google Maps Virtual Desktop Virtual Reality Unified Threat Management VoIP Cryptocurrency Going Green Data loss Laptop Comparison Communication Bluetooth Address Business Management Deep Learning desktop User Error Storage Avoiding Downtime Bitcoin Politics Printing Spam Digital Specifications Writing Collaboration Legal Bring Your Own Device Downtime Printer Dark Data Time Management Samsung Windows 8 Spyware Black Friday Retail Gadgets Search Emergency File Sharing Bandwidth Solid State Drive Access Control Customer Service Network Management Identity Theft Travel Chromebook G Suite Crowdsourcing Botnet CrashOverride Supercomputer Physical Security Motion Sickness Emoji Taxes Machine Learning IT Budget Personal Information Cortana IT Consultant Relocation Wi-Fi Meetings Virtualization Cleaning Work/Life Balance Private Cloud Computer Repair Webcam Law Enforcement Mobile Device Management How To Error Ben McDonald shares Health Point of Sale Mobile Computing Black Market Gadget Electronic Medical Records Paperless Office Twitter Staffing Upgrades Administrator what was your? Web Server Processors Remote Computing GPS Holiday 3D Printing Cameras Tracking Unsupported Software Update CCTV Tech Support Document Management Mobile Data Recovery Notifications

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3