SPONSORED

Tips to protect yourself from phishing attacks

Nov 13, 2024, 8:00 AM

an IT tech looks at a laptop in front of a server network...

Photo: Comcast Business

This article about phishing attacks is sponsored by Comcast Business


Introduction

With the rapid rise of artificial intelligence in the last year, cybersecurity attacks are becoming more widespread. It is more important than ever to guard your network and devices in your home and workplace. 

Comcast Business conducted an analysis of its customer base from 2023 to put together its 2024 Cybersecurity Threat Report, which outlines some of the key attacks users are at risk of and how you can keep yourself safe. 

The report identified phishing as the number one threat. Below, we outline more about phishing and how you can protect yourself from these types of attacks. 

What is phishing?

Phishing attacks are a form of deception in which the attacker disguises themselves as someone trustworthy to obtain sensitive information. This can look like an email or text message that appears to be sent from a trusted source asking for something private, like a password or credit card information. 

Phishing attacks can also occur from fake websites disguised to look real. These attacks can steal your address, phone number, and financial information and use it for nefarious purposes. 

Different types of phishing attacks

  • Email phishing is a fake email from someone who works with you or who you are close to asking you to provide sensitive information. The email may contain malware that they wish to install on your device. 
  • Spear phishing is when an attacker tries to acquire sensitive information or access an account by using counterfeit messages that appear to be legitimate. 
  • Smishing and vishing are phishing attacks conducted via SMS text messages (smishing) or video calls (vishing). These usually use AI to appear like a real person, often asking for credit card or bank account information. 
  • Clone phishing is similar to email phishing; this tactic creates an almost identical copy of a legitimate email that asks you to act, such as renewing a subscription or troubleshooting an account issue. 

How to recognize a phishing attempt

Now that you know the different types of attacks, it is crucial to be vigilant about checking your sources. If you receive an email or message from an unknown contact, block the number or email and do not open any attachments. 

You should also raise a red flag when you receive a message from someone you know with an unfamiliar greeting or who uses a different way of talking. Further, look out for unsolicited messages, especially if they contain grammar errors or suspicious links. 

What to do to protect yourself against phishing

Businesses like Comcast Business work diligently in the background to protect end users from becoming prey to a phishing attempt. With anti-phishing technologies, user education, and email gateway platforms, they use many tactics to protect businesses and homes of all sizes. 

However, attackers still prey on vulnerabilities. Here are some tips to protect yourself from a phishing attack

  • Verify the source of the email or message before providing any personal information.
  • Use strong, unique passwords for every account and update them periodically.
  • Use multi-factor authentication to add an extra layer of security to your devices. 
  • Be cautious about clicking links, calling a number, or downloading an attachment from an unverified source. Go to the company’s official website for their contact information or customer service number. 
  • Report suspicious emails to your email provider. 
  • Beware of urgency. Phishers often try to pressure you to take immediate action.
  • Educate yourself and others about the importance of these issues so that they do not fall prey as well. 

How to respond if you are the victim of a phishing attack

If you have fallen victim to a phishing attack, you should undergo some essential steps. First, contact your financial institutions to inform them that your credit card or accounts may be prone to fraudulent charges. Change your passwords on any account with your financial information stored, especially your email and bank account password. 

You should also report the incident to your IT team as soon as possible so they can determine if the risk is impacting other people in your company. If the incident happens outside of work, run your computer through an antivirus software and update your operating system. 

Conclusion

Now that you are armed with this information, take time to review these preventative measures to protect yourself from future attacks. 

Comcast Business takes a multi-layered approach to combating cybercriminals, using vigilant security practices to protect customers from increasingly sophisticated threats. Download the 2024 Comcast Business Cybersecurity Threat Report for more information and insights.

Related reading:

Comcast announces major fiber network expansion in Utah

This is a sponsored article brought to you by KSL News Radio in conjunction with the advertiser. The advertiser paid a fee to promote this article and may have influenced or authored the content. The views expressed in this article are those of the advertiser and do not necessarily reflect those of KSL News Radio, its parent company, or its staff.

We want to hear from you.

Have a story idea or tip? Send it to the KSL NewsRadio team here.

Sponsored

A surprise gift, wrapped and ready to bring holiday cheer! Whether for Christmas, a birthday, or an...

Western Nut

10 Holiday Gift Ideas to cover everyone on your list

This guide is for you if you need holiday gift ideas that will make a lasting impression. 

26 days ago

Stressed young woman checking bills, taxes, bank account balance and calculating expenses in the li...

The Law Offices of Jordan F. Wilcox

Why you should speak to a Utah lawyer about longstanding IRS tax issues

Hiring a lawyer to navigate longstanding IRS tax issues can make a significant difference in achieving a favorable resolution.

27 days ago

4 construction workers fixing roof against clouds blue sky, install shingles at the top of the hous...

Chipman Roofing

Weather the storms by maintaining your roof

By taking the time to assess your roof's condition and make repairs as needed, you maintain the longevity of your home's stability.

2 months ago

Tax Harassment...

The Law Offices of Jordan F. Wilcox

Feeling intimidated by the IRS? 6 Essential facts you should know.

If you are receiving threatening letters and wage garnishments from the IRS, hiring an attorney can help ensure your rights are protected.

2 months ago

Photo courtesy of Nightmare on 13th...

Nightmare on 13th

Here’s why Nightmare on 13th is the best haunted house in Utah

Fall brings Halloween, and Halloween brings Haunted Houses. There’s no better Haunted House than Nightmare on 13th – here’s why!

2 months ago

USA, Utah, Bear Lake. The deep blue of Utah's Bear Lake contrasts with autumn foliage....

Bear Lake Convention & Visitors Bureau

Experience Bear Lake’s all-year activities

We break down Bear Lake's four-season recreational offerings so the whole family can enjoy their time there any time of the year.

3 months ago

Tips to protect yourself from phishing attacks