Connect DS

ConnectDS are a leading UK Managed Cyber security services provider

  • About Us
  • Cyber Security Assessments
    • CREST Penetration Testing
    • Web Application Penetration Testing
    • Vulnerability Assessment
    • Threat Detection Assessment
    • Phishing Assessment
    • Cyber Security Auditing
    • Firewall Security Assessment
    • Dark Web Assessment
    • Microsoft 365 Security Assessment
  • Managed Security Services
    • Managed Detection and Response (MDR)
    • Extended Detection and Response (XDR)
    • Cyber Incident Response
    • Managed SIEM
    • Patch Management as a Service
    • Managed Next Generation Anti-Virus
    • Next Generation Firewall Services
    • Managed Email Security
    • Vulnerability Management as a Service (VMaaS)
    • Managed IDS
    • Ransomware Protection
    • Threat Hunting Services
    • Dark Web Monitoring
  • Compliance
    • MITRE ATT&CK Framework
    • NIST Cyber Security Framework
    • Cyber Essentials
    • CIS Security Controls
  • Vendors
    • Microsoft
    • Qualys
    • CATO Networks
    • Palo Alto
    • RSA NetWitness
    • Sophos
      • Sophos Intercept X
      • Sophos Firewall
      • Sophos XGS 87 Firewall
      • Sophos XGS 107 Firewall
      • Sophos XGS 116 Firewall
      • Sophos XGS 126 Firewall
      • Sophos XGS 136 Firewall
    • SentinelOne
    • Untangle Firewall
      • Untangle z4 Firewall
      • Untangle z6 Firewall
      • Untangle z12 Firewall
      • Untangle z20 Firewall
    • Fortinet
    • Defender for Endpoint
  • Blog
  • Contact

Why do hackers use phishing?

20 May 2022 by Joe Burstein

Hackers use phishing as it is the easiest way to obtain sensitive information. Without phishing, a lot of work and effort is required to compromise a person’s data.

How is e-mail hacked?

20 May 2022 by Joe Burstein

E-mail is normally hacked in the following ways:

  • Brute force i.e. a hacker uses software to guess the password.
  • Social engineering
  • Key loggers
  • Fake web pages/login pages

This is not an exhaustive list but these are the most common ways that e-mail is hacked.

What is the difference between phishing and spam?

20 May 2022 by Joe Burstein

The difference between phishing and spam is that phishing aims to obtain information from you whereas spam typically gives you unwanted information.

What happens when you get phished?

20 May 2022 by Joe Burstein

When you get phished, you’re likely to have either your personal information stolen and used against you (such as to steal your money) or your data and files on your laptop will be locked up (i.e. encrypted).

If someone has phished you and encrypted your data, they will likely ask for a ransom to be paid in order to unlock it. The software used is known as ransomware.

How do you know if someone is phishing you?

20 May 2022 by Joe Burstein

The following are signs that someone is phishing:

  • The e-mail address/domain name doesn’t match the company they claim to represent
  • The message sent to you contains spelling mistakes or poor use of language
  • You are being asked to take action and enter personal details
  • The message asks you to click a link or download a file
  • The message you have received has come out of the blue
  • You receive a message from a company that you have no history dealing with

This is not an exhaustive list so, if you are unsure, ask somebody else to check the information you have been sent. A simple way of checking is to contact the company using details you find on their official website and asking them about the message you have received.

How can you avoid phishing?

20 May 2022 by Joe Burstein

There is no one way to avoid phishing but there are ways you can avoid being a victim of phishing.

General advice is to double check information sent to you such as whether the source is legitimate or assess what you are being asked to do. If you are being asked to enter personal information, always contact the individual or company asking for it using official contact details. This can include the number on the website or by asking them in person.

How do you know if someone is phishing?

20 May 2022 by Joe Burstein

The following are signs that someone is phishing:

  • The e-mail address/domain name doesn’t match the company they claim to represent
  • The message sent to you contains spelling mistakes or poor use of language
  • You are being asked to take action and enter personal details
  • The message asks you to click a link or download a file
  • The message you have received has come out of the blue
  • You receive a message from a company that you have no history dealing with

This is not an exhaustive list so, if you are unsure, ask somebody else to check the information you have been sent. A simple way of checking is to contact the company using details you find on their official website and asking them about the message you have received.

What is the most common example of phising?

20 May 2022 by Joe Burstein

The most common example of phishing is an e-mail or text message which tells the user that there is a security issue with one of their online accounts.

If the user clicks a link it will take them to an unsecure platform and ask for personal details to be entered. If the user downloads a file, the file will probably contain malware which infect the device.

What do phishing means?

20 May 2022 by Joe Burstein

Phishing is the act of convincing someone to interact with malware or unsecure portals using a message which appears legitimate.

What is an example of phishing?

20 May 2022 by Joe Burstein

An example of phishing is when you receive a message, such as a security alert, asking you to take action either by clicking a link or downloading and opening a file.

The link or file will contain malware that is activated by the user interacting with it.

Connect Digital Security Ltd, owned and operated by Global Technical Solutions Ltd. Connect Digital Security is registered in England & Wales with Company No. 13783976. Global Technical Solutions Ltd, registered in England & Wales with Company No. 10272763 VAT No. GB246760881 Registered Office: Castle House, Castle Street, Guildford, England, GU1 3UW. Surrey Office: Clockbarn, Tannery Lane, Send, Woking, Surrey GU23 7EF. London Office: 36 – 37, Albert Embankment, London. SE1 7TL. Cebu Office: Cebu Asia Town IT Park, 5th Floor Park Centrale, Jose Maria Del Mar Street, Cebu City, 6000 Cebu, Philippines Privacy Policy

  • About Us
  • Cyber Security Assessments
    • CREST Penetration Testing
    • Web Application Penetration Testing
    • Vulnerability Assessment
    • Threat Detection Assessment
    • Phishing Assessment
    • Cyber Security Auditing
    • Firewall Security Assessment
    • Dark Web Assessment
    • Microsoft 365 Security Assessment
  • Managed Security Services
    • Managed Detection and Response (MDR)
    • Extended Detection and Response (XDR)
    • Cyber Incident Response
    • Managed SIEM
    • Patch Management as a Service
    • Managed Next Generation Anti-Virus
    • Next Generation Firewall Services
    • Managed Email Security
    • Vulnerability Management as a Service (VMaaS)
    • Managed IDS
    • Ransomware Protection
    • Threat Hunting Services
    • Dark Web Monitoring
  • Compliance
    • MITRE ATT&CK Framework
    • NIST Cyber Security Framework
    • Cyber Essentials
    • CIS Security Controls
  • Vendors
    • Microsoft
    • Qualys
    • CATO Networks
    • Palo Alto
    • RSA NetWitness
    • Sophos
      • Sophos Intercept X
      • Sophos Firewall
      • Sophos XGS 87 Firewall
      • Sophos XGS 107 Firewall
      • Sophos XGS 116 Firewall
      • Sophos XGS 126 Firewall
      • Sophos XGS 136 Firewall
    • SentinelOne
    • Untangle Firewall
      • Untangle z4 Firewall
      • Untangle z6 Firewall
      • Untangle z12 Firewall
      • Untangle z20 Firewall
    • Fortinet
    • Defender for Endpoint
  • Blog
  • Contact