BNMC Blog

Mobile Smishing is Being Employed More Often

Mobile Smishing is Being Employed More Often

Cyberattacks continue to be a major problem as scammers send out billions of phishing messages a day. While it doesn’t really sound that nefarious it can be a major problem for a lot of people. One version of phishing, the absurdly labeled smishing, is gaining traction and presents another avenue of attack for hackers. 

What is Smishing?

Smishing is still phishing; it is just done from an SMS account (thus the name). Typically phishing is executed through telephone messages or email, but today with so many people using mobile devices for work, text messages are used to quickly communicate. 

The smishing attack comes in the form of a text message, which is one of the most trusted forms of communication. People won’t hesitate to click on a link in a text message, making the smishing attack one of the most dangerous attacks out there. 

Typically, the attack will come in the form of a vaguely worded message from an authority figure. This not only pulls the wool over the eyes of the recipient, it does so by using someone they fear or trust to facilitate action. 

With many people keeping a lot of proprietary or sensitive data on their phones, if a hacker were to gain access to it, there is a lot of havoc it could wreak. 

How to Spot a Smishing Message

Identifying a smishing message is a little more difficult because of the nature of a text message. You typically don’t get text messages from scammers if you’re lucky so any person could be fooled by this avenue of attack. 

  • If the sender of a text message isn’t familiar to you, do not open the message and make sure you don’t click on any included links. 
  • If you cannot verify the legitimacy of the message, do not release sensitive information. If you receive a text message from Twitter informing you of a problem with your account, access Twitter separately to confirm before you resolve it. Don’t click the link in the text to go to Twitter, open up the app or go to a web browser on a different device. The same applies for any account.
  • If you get messages from people you don’t know, block the numbers. Better to be safe than sorry.

Security has to be at the forefront of every employee’s mind to keep unwanted malware and scammers off of your business’ network. To learn more about smishing, phishing and more avenues of cyberattack, return to our blog regularly.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, January 23 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.bnmc.net/

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing User Tips Privacy Cloud Email Network Security Microsoft Software Hackers Efficiency Business Workplace Tips Hosted Solutions Data Hardware Computer Google Malware Communication IT Services IT Support Mobile Devices Small Business Mobile Device Smartphone Internet Android Cloud Computing Tech Term Data Recovery Managed IT Services Phishing Backup Ransomware Innovation Smartphones Users Windows VoIP Outsourced IT Saving Money Cybersecurity Network Information Upgrade Miscellaneous Social Media Data Backup Browser Disaster Recovery Passwords Microsoft Office Quick Tips Facebook Windows 10 communications Business Continuity Office 365 Business Management Server Managed IT Services Productivity Internet of Things Managed Service COVID-19 Windows 10 Data Management Apps App Gmail Artificial Intelligence Vulnerability Remote Monitoring Remote Work Gadgets Collaboration Word Save Money Analytics Remote Workers Government Money Encryption Router WiFi Infrastructure Mobile Office Chrome Managed Service Provider Conferencing Virtual Reality Website Networking Paperless Office IT Support Access Control Applications VPN Spam Holiday BYOD Display Information Technology Settings Company Culture Google Drive Tip of the week Employer-Employee Relationship Risk Management HIPAA Office Tips BDR Hacker Data storage Wi-Fi IT Management Data Security Computers Big Data Operating System Unified Threat Management Business Technology Virtual Private Network Bandwidth Maintenance Content Filtering Firewall Robot Document Management Education Apple Storage Avoiding Downtime Automation Employee-Employer Relationship Wireless YouTube Development End of Support Antivirus Password Training Social Network Hard Disk Drive Remote Computing OneNote Break Fix Data Breach Search Mobile Security SaaS Windows 7 Software as a Service Laptop The Internet of Things Virtualization Computing Outlook Data loss Server Management Compliance Business Intelligence Bring Your Own Device Social Vendor Touchscreen Retail Alert LiFi Telephone Systems desktop Cybercrime Hosted Solution Managed IT Downtime Humor Administration Tablet Marketing Regulations Best Practice How To iOS Mouse Monitors Augmented Reality Vendor Management MSP Chromebook Going Green Managing Stress Two-factor Authentication Managed Services Solid State Drive Managed IT Service Printing Identity Theft IT Customer Relationship Management Scam Fraud Cost Management Migration Consulting Corporate Profile Heating/Cooling Multi-Factor Security Scary Stories Safety Identity Continuity Legal LED Threats Policy Windows 8 Laptops G Suite Time Management Printer Employees Running Cable Smart Office Unified Communications Drones PowerPoint Automobile Screen Reader Charging Banking Network Congestion Licensing Dongle Black Friday Holidays Buisness Wires Mobility Batteries Dell Procedure Virtual Desktop Assessment Mobile Device Management WannaCry Servers Google Calendar Distribution Sports Solar Deep Learning Co-Managed IT Cabling Emergency Managed Services Provider Network Management Gig Economy Writing Work Onboarding GDPR Google Maps Dark Web Smart Tech Reviews Cooperation Service Level Agreement Slack Hard Disk Drives Cyber Monday Payment Card Voice over Internet Protocol Alt Codes Print Toner Myths PCI DSS Dark Data Hotspot Update Internet Exlporer Messaging Legislation Logistics Content Huawei Connectivity Entertainment SharePoint FBI IT Technicians Optimization Budget Digital Signage Data Warehouse Microsoft Excel Shortcuts Mobile Management Techology Remote Staff Leominster Monitoring Solid State Drives Digital Payment Smart Technology Inventory Modem Politics FinTech Typing Battery Customer Service Language Value Current Events Employee-Employer Relationships Digital Statistics Asset Management Work/Life Balance Streaming Meetings Processor Disaster Lenovo Health IoT Private Cloud Hybrid Cloud Downloads K-12 Education Office Mirgation Samsung Recycling Troubleshooting Business Analysis Mail Merge Blockchain Peripheral Security Cameras Profiles VoIP Unified Threat Management user treats K-12 Schools Spying National Security Shortcut Distributed Denial of Service Shadow IT Cookies Tech Support Cryptocurrency Files Computing Infrastructure Professional Services IT solutions Analysis Students Spyware Bluetooth Comparison Memes Social Networking Google Docs Human Error Memory Uninterrupted Power Supply Firefox Superfish Star Wars Hacks Scalability Computer Care IBM Instant Messaging Halloween Social Engineering Chatbots eWaste File Sharing Virus Address Permissions Management Utility Computing User Error Shopping Wearable Technology Twitter Network upgrade Google Wallet Updates Patch Management Gamification Nanotechnology Websites Bitcoin RMM Alerts USB Mixed Reality Specifications Motherboard Cables Business Growth Device Reducing Cost Crowdsourcing Travel Personal Information Botnet Cortana Supercomputer CrashOverride 3D Printing Staffing Motion Sickness Financial Regulation Taxes Processors Administrator Machine Learning IT Budget Unsupported Software Web Server what was your? Mobile Computing GPS Relocation IT Consultant Computer Repair Cameras Mobile Data Recovery Tracking How To Cleaning CCTV Black Market Law Enforcement Webcam Electronic Medical Records Notifications Printers Error Physical Security Emoji Upgrades Gadget Point of Sale Ben McDonald shares

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3