How to protect yourself online from phishing and ransomware

09/24/2021
A man checking his email.

Share


5 ways to spot, avoid, and deal with phishing and ransomware attacks

Discover how to avoid phishing attacks before one is sent to you.

Phishing refers to the means that cybercriminals use to lure or coerce victims into clicking questionable links and/or downloading malicious files. It can come via email or any other collaboration software.

Phishing emails usually have some or all of the following telltale features:

  • They’re sent from odd or overly generic email addresses.
  • The messages are usually laced with grammatical errors.
  • They typically prey on your trusting nature and attempt to instill fear or create a sense of urgency.
  • They include links to odd or apparently unrelated sites.

Ransomware is a frequent partner of phishing attempts. Once a victim clicks the link to the suspicious site or unwittingly downloads the malicious file, it encrypts your sensitive data. That data remains inaccessible to you until you pay the demanded ransom.

It’s not a rare occurrence, either: The heat of the pandemic brought a national uptick in phishing and ransomware attacks.

Aware of the prominence and danger of this issue, Adobe, the National Cyber Security Alliance, and Speechless Inc. have produced this educational video to give you an idea of what phishing and ransomware look like in operation.

Check out their informative and entertaining video below.

What you need to do:

  • Be on the lookout for suspicious emails. When you find them, report them to your organization’s IT/cybersecurity team.
  • Back up your data in secure locations. This simple step can give you the confidence and freedom to ignore whatever ransom that shifty characters attempt to demand from you.
  • Utilize updated antivirus software and always keep it running. It’s one of your surest defenses against ransomware.
  • Familiarize yourself with the basic indicators of a phishing attempt and don’t fall for it.
  • Be mindful of freebies coming from questionable sources. If it looks too good to be true, it usually is.

To further bolster your cybersecurity, sign up for one of our legal packages. Cybercriminals are more relentless than ever; don’t get caught slacking.


Contact Us

+1 877-615-1725

info@consumerattorneys.com

Blog

Related Articles

The picture shows a fraud thief who is trying to steal information. One's Social Security number, along with an address, is the most valuable piece of information identity thieves can get their hands on.

11/22/2021


Key Information Regarding Identity Theft

One's Social Security number, along with an address, is the most valuable piece of information identity thieves can get their hands on.

 image depicting symbols of identity theft

11/02/2021


What are the early indicators of identity theft?

Several telltale signs can give away the fact you've been a victim of identity theft early.

data lock

10/22/2021


Does the IRS Verify Your Identity?

The IRS can verify your identity if it believes there is fraud related to a tax filing.

A login screen asking for a username and a password.

10/15/2021


How Often Should I Update My Online Account Passwords?

Several factors influence when you should be changing your online passwords.

A laptop with the text "cyber security" on its monitor.

10/15/2021


Cyber Security: How to Protect Yourself on Social Media

Defend yourself from cyber criminals on social media with strong cyber security practices.

A man holding a USB drive, a piece of removable media.

10/06/2021


How to protect yourself against malicious removable media

Be careful when dealing with removable media from unknown sources

View all articles