Logo

Phishing: A Guide for Perth Small Businesses

As businesses rely more on technology and are increasingly more “internet facing”, solid cybersecurity measures are important. Businesses are under constant attack from everyone – governments, criminals, hackers and even teenagers.

Phishing is one of the most common tools used by those who try to get access to your systems. Small businesses are particularly vulnerable, as they feel cybersecurity is costly, and consequently don’t have robust security in place. However, a cyber-attack can create problems for your business reputation and cost you irreparable damage. It isn’t time to put your head in the sand! There are some cost-effective steps that you can take.

What is phishing?


Phishing is a type of online fraud used to steal user data like login credentials, credit card numbers, or other sensitive data by cybercriminals pretending to be a legitimate organisation. The data is later used to access other important accounts leading to identity theft and financial loss.

How does it work?

Phishing usually occurs in the form of a fraudulent email, text message or instant message. The email or message is from a cybercriminal masquerading as a trusted source and looks like a real message, including the logo of the sender. It can be a message to confirm or renew your account, update payment details or other information, or other similar instructions which look very valid. The recipient is tricked into clicking the link which causes malware to be installed on the user’s system or reveal user information to the attacker.

What are the reasons for phishing attacks to be so successful?

Here are some of the reasons why victims keep falling for phishing attacks.

Types of phishing attacks?

Understanding the different types of phishing attacks is important to help you protect your business from it.

Email phishing

This is the most common type. A criminal sends out an email with malicious links to a large number of random people, usually in the thousands.

Characteristics

Want to learn more? Read our blog on types of phishing emails and how to recognise them.

Spear phishing

In this type of attack, the criminal targets a specific organization or individual. The attacker would have researched the victim and would have good knowledge about the communication channels and organizational structure of the entity or online habits of the individual.

Characteristics

Smishing and vishing

The phisher uses telephone calls and text messages as means of communication. The characteristics of smishing and vishing are the same as that of email phishing. The only difference is that the former use telephones and the latter use emails for communication.

Characteristics

Angler phishing

The phisher uses social media for deceiving the victims and obtaining sensitive data.

Characteristics

Different phishing techniques

Phishing-Computing-Australia Group
Here are a few common phishing techniques you need to be aware of to protect your business.

Website Imitations

Usually, the links in the phishing emails will be linked to a fake website that looks similar to an authentic one. Once you click through, these sites will ask for your bank login credentials, credit card number or other sensitive information.

Deactivation notifications

“Your subscription is expiring”

“Renew your subscription”

“Your account will be deactivated on…”

The above messages create a sense of urgency in you, right? That’s precisely what phishers use against you. These kinds of deactivation alert emails are among the most common techniques they use to obtain your data. These messages will mainly include malicious links that take you to fake sites. You will be asked to share your banking information or enter the old password to create the new one.

Offering technical support

Another common phishing technique is offering technical support. The cybercriminals send emails pretending to be from authentic firms providing support and usually contains a toll-free number. Once you call you get connected to a scammer pretending to offer support. The scammer will then make you download software for remote access and acts like helping you resolve the technical issue while secretly pilfering your sensitive data.

Monetary reward or donation messages

You may receive an email or message selected for a monetary reward or a donation with a detailed explanation of why you were chosen for the same. Similar to the above methods, you will be asked to share your personal details or click on a link to access the reward.

How can you protect your small business from phishing?

We recommend the following to protect your business from phishing.

What is ‘The Essential Eight’?

The essential eight is a list of mitigation strategies from the Australian Cyber Security Centre (ACSC) to assist in preventing malware attacks and cybersecurity incidents.
You can read more about Essential Eight here.

Computing Australia Security for Small businesses in Perth

A phishing attack can cause irreparable losses for victims. For small businesses, it can cause financial losses, loss of reputation and customer trust. A phishing attack can also quickly turn into a major cybersecurity event, which can paralyze a business. Protect your business now. Talk to our cybersecurity experts right away.

Jargon Buster

Advanced Persistent Threat – a cyber-attack where a criminal gains access to a system or network and remains there for a prolonged without being detected

Malicious Links – a link created for the purpose of a cyberattack.

2 FA – 2 Factor Authorisation – Access is granted only after two steps of authentication. You will need to provide two pieces of evidence to establish your identity. This is also known as MFA (Multi-factor authentication).

Article originally published on 07/08/2020
Revised by Blake Parry on 06/07/2021
Added new sections:
How does it work?
What are the reasons for phishing attacks to be so successful?
Different phishing techniques