Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

What Is SMiShing?
SMiShing is a mobile variant of phishing that involves the use of a text message, rather than an email, to catch the target in the phisher’s net. These attacks are highly reliant on the target’s compliance with the instructions the cybercriminal provides, as well.

These attacks can be more effective than the typical phishing attack, as the general public is increasingly aware of cyber threats--yet don’t expect these threats to manifest in their cell phone.

Just as one would experience in the ‘typical’ phishing attack, a ‘smisher’ will likely try to gain your trust in order to extract credentials. This ultimately allows them access to the accounts they obtained the credentials for, permitting them to wreak havoc and/or steal what they please. This is especially dangerous if they gain access to any client financial information you may have on file. Alternatively, some smishers will claim that if you don’t access a link and enter your personal information, that you will be charged daily for some service. Naturally, if this service is one that your organization has not signed up for, this message should be reported to IT and then disregarded.

How To Spot SMiShing Scams
First, if you suspect that a message is fraudulent, it never hurts to reach out to confirm that the message was sent by who it seems to have been. To do so, reach out via a different channel than your text, such as calling an official service number to speak directly to a representative. This allows you to confirm that the message was legitimate or fraudulent without exposing yourself or the business to greater risk.

In essence, avoid responding to text messages from senders that you don’t know--especially when the number is a 5000 number. This indicates that the message was actually an email sent as a text message, which is often a tactic used by scammers.

Finally, keep an eye out for any messages that contain downloadable apps. These are a favorite method to introduce malware to a mobile device. If an app doesn’t come from an official app store, it is likely a piece of disguised malware.

How To Be The Most Safe
If in doubt, confirm before you answer. Additionally, a VPN (or virtual private network) can help you maintain your mobile security, especially when paired with the practices outlined above.

BNMC can help you to put these safeguards, and others, in place for your business devices. Give us a call at 978-482-2020 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 19 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Malware Privacy Hackers Business Computing Software Internet Ransomware Microsoft Hosted Solutions Business Google Network Security Android IT Services Smartphone Windows Mobile Devices Computer Backup Small Business Windows 10 Innovation Data Management App Artificial Intelligence Hardware Data Encryption Server Cloud Computing Business Continuity Browser Internet of Things Tip of the week Saving Money Outsourced IT Managed IT Services Remote Monitoring Productivity Office 365 User Tips Business Management Phishing Gmail Data Recovery Smartphones IT Support Managed Service Provider Efficiency Upgrade Risk Management Vulnerability Data storage IT Management Money Settings Chrome Word Communication Antivirus Office Tips Productivity Cybersecurity Big Data IT Support Infrastructure Facebook Robot Windows 10 Google Drive Analytics Two-factor Authentication Scam Network Microsoft Office Mobile Device VPN Data Security Server Management Virtual Private Network Outlook Hosted Solution Monitors Data loss Holiday Save Money Telephone Systems Workplace Tips Alert Bandwidth Automation Firewall YouTube Mouse Miscellaneous Virtual Reality communications Social Media Apple Storage Data Backup SaaS Employer-Employee Relationship HIPAA Disaster Recovery Mobile Security Passwords Business Technology Government LiFi Computing Unified Threat Management Managed IT Services BYOD Administration Content Filtering End of Support Maintenance Safety Chatbots Uninterrupted Power Supply Managed IT Service Patch Management Google Docs Network Congestion Running Cable Hacks IBM Alerts Computer Care Customer Relationship Management Heating/Cooling Buisness Google Wallet Identity Wireless Multi-Factor Security Business Growth Break Fix Wi-Fi Virtual Desktop Computers Laptop Password Corporate Profile Licensing Training Networking Automobile Servers Deep Learning Drones Tech Term Google Calendar Hacker Dell Dark Web Paperless Office Spam Display WannaCry Cooperation Legislation Bring Your Own Device Downtime Compliance Google Maps Alt Codes Microsoft Excel Quick Tips Gadgets Staff Techology Tablet Statistics Budget Regulations Typing desktop Blockchain Mail Merge Humor VoIP Apps Halloween Current Events Digital Users Augmented Reality Unified Threat Management Politics Comparison Collaboration Bluetooth Cryptocurrency Permissions Address Samsung Education Tech Support Remote Computing Avoiding Downtime Scary Stories Going Green Spyware Wearable Technology Document Management User Error Specifications File Sharing Website Bitcoin Solid State Drive Fraud Websites Time Management Unified Communications Writing Sports Printing Identity Theft Printer Black Friday Search Legal Dark Data The Internet of Things Windows 8 Hard Disk Drive Emergency Network Management Retail Applications Access Control Cabling Cyber Monday VoIP Customer Service Cybercrime Hotspot WiFi Touchscreen Office How To Marketing IT Technicians SharePoint Smart Technology Managed IT Vendor Management Operating System Social Language Lenovo Social Engineering Information Technology Firefox Mirgation Digital Payment Downloads Best Practice Disaster Distributed Denial of Service Shortcut Computing Infrastructure Superfish IT solutions Private Cloud Webcam Personal Information Law Enforcement Cortana Error Ben McDonald shares Point of Sale Gadget Virtualization Computer Repair Mobile Device Management Staffing Administrator How To what was your? Web Server Processors Health Mobile Computing GPS Black Market Cameras Electronic Medical Records Twitter Tracking Upgrades CCTV 3D Printing Notifications Travel Unsupported Software G Suite Crowdsourcing Update Botnet CrashOverride Supercomputer Motion Sickness Mobile Data Taxes Recovery Machine Learning IT Budget IT Consultant Chromebook Relocation Meetings Physical Security Cleaning Work/Life Balance Emoji

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3