Hook, line and sinker – understanding and avoiding phishing attacks

Hook, line and sinker - understanding and avoiding phishing attacks

Authored by NMU

Addressing the growing threat of phishing attacks to businesses

Keeping pace with the ever evolving and increasingly sophisticated nature of cyber threats is important for all businesses. Once again, we take a deeper look at key cyber threats, identifying emerging cyber trends, and sharing our insights and understanding with brokers. 

Join us as we shine a light on the murky world of phishing attacks in 2023 and take the lid off some of the more common methods being used by cyber criminals, as well as some unwelcome new threats that we’ve spotted.

Dispelling the myths and acknowledging the facts

Surprisingly, many businesses are still under the mistaken belief that their security strategies of previous years are sufficient for today’s cyber threats, or that they can’t possibly be a target themselves. Unfortunately, we believe that they’re wrong. Ultimately, nobody is immune to cybercrime, and phishing and ransomware attacks continue to be the mainstay cyber threat that criminals employ to gain access to accounts, stealing key information in the process.

Phishing attacks and the first line of defence

To start with, you need to recognise a scam when you see it and businesses should familiarise themselves with the giveaway signs that allow you to spot when something is not above board:

Email address:  Check the sender’s email address carefully. Phishing emails often come from fake or suspicious looking addresses. Urgency:  Phishing attacks often create a sense of urgency to make the victim act quickly without thinking.Misspellings and grammatical mistakes:  Many phishing emails contain spelling and grammatical errors, as they are often sent out in large quantities without much effort put into them. Suspicious links:  Hover over any links in the email to see where they lead. If the URL looks suspicious or unfamiliar, do not click on it.Request for personal information:  Legitimate companies will never ask for personal information such as passwords or credit card numbers through email. Attachments:  Be cautious of attachments, as they can contain malware or viruses.Unfamiliar sender:  If you receive an email from someone you don’t know, or who doesn’t seem relevant to you, it’s best to delete it without opening it.

See also  Best of Artemis, week ending June 23rd 2024

Five types of phishing attacks

At present, five of the most common types of phishing include:

Spear Phishing: This type of attack is highly targeted and personalised, often using personal information and social engineering to make the victim more likely to fall for it.Whaling: Like spear phishing but targeted towards high-level executives or individuals with access to sensitive information in a company.Clone Phishing: Attackers create an almost identical copy of a legitimate email or website to trick victims into providing their personal information.Vishing: A form of phishing that is done through phone calls, where the attackers’ tactics are to entice victims into divulging sensitive information.Smishing: Like phishing but done through by sending deceptive text messages instead.

Today, phishing accounts for 16% of all cyber-attacks which clearly indicates that cyber security measures and staff education only go so far in protecting a business.  

Cyber insurance goes a step further and it’s a step we strongly recommend a business takes.

Cyber security only goes so far

NMU cyber insurance solution goes further 

What’s best for businesses of every size – small, medium, and blue-chip – is to plan for every eventuality, even a dreaded data breach. Any form of attack though could significantly impact a company, both financially and operationally, which is when cyber insurance could prove invaluable.

“Cyber criminals don’t discriminate between the size of the business, or sometimes even the industry, but what they do is target an organisation’s defences, or lack of defences, and unfortunately the defences of an SME’s can be weaker than the defences of a larger company due to the size of their IT security budget. Therefore, the importance of a fit for purpose cyber insurance policy is vital to protect an SME.”

See also  Swiss Re group CUO moving to SCOR to serve as CEO

Matt Drinkwater, NMU Cyber and Financial Lines Underwriting Manager

Our own product provides businesses with a simple, robust solution for a range of first party and third-party risks related to cyber-attacks, all backed by strong breach response and restorative support services.

Find out more about NMU’s Cyber insurance proposition HERE