{"id":6318,"date":"2023-03-22T20:48:53","date_gmt":"2023-03-22T23:48:53","guid":{"rendered":"https:\/\/www.certisur.com\/?page_id=6318"},"modified":"2023-05-02T16:50:50","modified_gmt":"2023-05-02T19:50:50","slug":"how-to-protect-from-phishing","status":"publish","type":"page","link":"https:\/\/www.certisur.com\/en\/news\/how-to-protect-from-phishing\/","title":{"rendered":"How to protect from phishing"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"6318\" class=\"elementor elementor-6318 elementor-6317\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-253db3f cs-elementor-noticia-header elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"253db3f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-753a928\" data-id=\"753a928\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49d3e03 elementor-widget elementor-widget-heading\" data-id=\"49d3e03\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">How to protect from phishing<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b1dcd6 elementor-widget elementor-widget-text-editor\" data-id=\"8b1dcd6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In 2020, spam emails in Latin America averaged over 50% of all global email traffic.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59077b3 cs-elementor-noticia-header-date elementor-widget elementor-widget-text-editor\" data-id=\"59077b3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t22 March, 2023\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e40cb66 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e40cb66\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2b8921d8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2b8921d8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-554b7377\" data-id=\"554b7377\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1a135fed elementor-widget elementor-widget-text-editor\" data-id=\"1a135fed\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Sophos company, in its global Phishing Insights 2021 survey, revealed that <strong>phishing attacks increased<\/strong> <strong>considerably<\/strong> during the pandemic, as millions of employees working from home became the main target of cybercriminals.<\/p>\n<p><strong>Phishing is a type of online identity theft.<\/strong> This fraudulent action is characterized by attempts to illegally acquire a user&#8217;s personal data such as passwords, financial or banking information, credit card numbers, among others.<\/p>\n<p>The scammer uses email, apps, and websites that are specifically designed to steal personal data, posing as a trusted person or company. When sending a message to an email, application or other tools, the cybercriminal waits until the recipient receives and opens the message, an action that in many cases is enough for the victim to fall for the fraud. In other cases, it is necessary for the victim to click on a certain link in order for the criminal to have access to the information they want.<\/p>\n<p>\u201cThere is more than one way to make a victim fall and this type of crime is becoming more and more sophisticated. Digital scammers have become adept at making fraudulent emails look exactly like legitimate ones, often from companies or establishments you are familiar with and trust. Phishing emails are commonly masquerading as businesses, but social media accounts are also a trending target, as many users are more careless about protecting them, \u201dsaid Dean Coclin, DigiCert&#8217;s senior director of business development. .<\/p>\n<p><em>Phishers<\/em> will go after anyone, but they tend to target CEOs and CFOs, law firms, human resources, and financial institutions. In addition, in recent years digital stores and social networks have seen an increase in these attacks. These groups have customer data and confidential information that attackers are looking for and need to be on high alert to protect themselves from phishing scams.<\/p>\n<p>While many people believe it to be the same thing, phishing is very different from spam. In practice, while spam is only related to a large number of emails and messages without any criminal purpose, phishing aims to harm the victim, accessing data and personal information.<\/p>\n<p>Spam is quite common on the Internet. Every day, countless messages from websites, stores and applications fill the inbox of most users. It only has the inconvenience of inbox clutter, but does not pose any risk to the recipient.<\/p>\n<p>On the other hand, phishing uses the sending of massive messages to deceive the target, inducing them to click on false links and \/ or provide personal information, always with the aim of harming the victim.<\/p>\n<p>There is anti-phishing software on the market, with effective anti-spam filters, which warn of signs of irregularities in emails. As for websites, there are antivirus and firewalls that scan and report irregularities or block access when they detect any possibility of fraud.<\/p>\n<p><strong>By following these 10 tips, you are on your way to becoming an expert in phishing scam defense.<\/strong><\/p>\n<ol>\n<li>Instead of clicking a link in an email, open a new browser page and enter the address \/ URL of the site you want to visit. Sometimes a fraudulent link will be very similar to a trusted one, just changing a few imperceptible letters.<\/li>\n<li>Update both your operating system and browser software. The latest versions of most browsers come equipped with anti-phishing filters. As attackers devise new attacks, software updates improve their filters.<\/li>\n<li>Block pop-up windows when browsing the Internet.<\/li>\n<li>Never enter personal information in pop-ups unless you are absolutely sure they are coming from your intended site.<\/li>\n<li>For everyday computer use, use a standard user account instead of an administrator account. Switch to the administrator account only when administrator roles are required. This protects your computer by reducing access to critical administrative functions.<\/li>\n<li>Delete and don&#8217;t open suspicious email messages. It can be tempting; sometimes the subject can be flashy or so generic that you want more information, but avoid the temptation and just delete it.<\/li>\n<li>Accept only trusted certificates on web pages. Don&#8217;t ignore browser warnings. Do not simply dismiss the warnings you think you have seen without reading them carefully and without considering the implications.<\/li>\n<li>Do not click on links that will take you to an unknown site or IP address.<\/li>\n<li>Be aware of browser warnings. For example, Chrome displays a warning triangle with &#8220;Not secure&#8221; in the address bar if a site does not have the HTTPS security protocol enabled. Enable protection against malware. This can generally detect and deter most threats without doing anything.<\/li>\n<li>If you receive a phishing email, please do not open it, click on any link or attachment, and delete it immediately. If you continue to receive suspicious emails, report them to the Anti-Phishing Working Group (APWG).<\/li>\n<\/ol>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In 2020, spam emails in Latin America averaged over 50% of all global email traffic. Sophos company, in its global Phishing Insights 2021 survey, revealed that phishing attacks increased considerably during the pandemic, as millions of employees working from home became the main target of cybercriminals. Phishing is a type of online identity theft. This [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":4975,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[69],"class_list":["post-6318","page","type-page","status-publish","hentry","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CertiSur<\/title>\n<meta name=\"description\" content=\"How to protect from phishing Follow these 10 tips and you will become a phishing defense expert.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.certisur.com\/en\/news\/how-to-protect-from-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect from phishing - CertiSur\" \/>\n<meta property=\"og:description\" content=\"How to protect from phishing Follow these 10 tips and you will become a phishing defense expert.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.certisur.com\/en\/news\/how-to-protect-from-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"CertiSur\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CertiSur\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-02T19:50:50+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CertiSur\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.certisur.com\/en\/news\/how-to-protect-from-phishing\/\",\"url\":\"https:\/\/www.certisur.com\/en\/news\/how-to-protect-from-phishing\/\",\"name\":\"How to protect from phishing - CertiSur\",\"isPartOf\":{\"@id\":\"https:\/\/www.certisur.com\/en\/#website\"},\"datePublished\":\"2023-03-22T23:48:53+00:00\",\"dateModified\":\"2023-05-02T19:50:50+00:00\",\"description\":\"How to protect from phishing Follow these 10 tips and you will become a phishing defense expert.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.certisur.com\/en\/news\/how-to-protect-from-phishing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.certisur.com\/en\/news\/how-to-protect-from-phishing\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.certisur.com\/en\/news\/how-to-protect-from-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"News\",\"item\":\"https:\/\/www.certisur.com\/en\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to protect from phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.certisur.com\/en\/#website\",\"url\":\"https:\/\/www.certisur.com\/en\/\",\"name\":\"CertiSur\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.certisur.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.certisur.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.certisur.com\/en\/#organization\",\"name\":\"CertiSur\",\"url\":\"https:\/\/www.certisur.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.certisur.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.certisur.com\/wp-content\/uploads\/Logo-CertiSur-Signo-de-Confianza-300dpi-copy.png\",\"contentUrl\":\"https:\/\/www.certisur.com\/wp-content\/uploads\/Logo-CertiSur-Signo-de-Confianza-300dpi-copy.png\",\"width\":3075,\"height\":2483,\"caption\":\"CertiSur\"},\"image\":{\"@id\":\"https:\/\/www.certisur.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CertiSur\",\"https:\/\/x.com\/CertiSur\",\"https:\/\/www.youtube.com\/c\/TecnologaCertiSur\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CertiSur","description":"How to protect from phishing Follow these 10 tips and you will become a phishing defense expert.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.certisur.com\/en\/news\/how-to-protect-from-phishing\/","og_locale":"en_US","og_type":"article","og_title":"How to protect from phishing - CertiSur","og_description":"How to protect from phishing Follow these 10 tips and you will become a phishing defense expert.","og_url":"https:\/\/www.certisur.com\/en\/news\/how-to-protect-from-phishing\/","og_site_name":"CertiSur","article_publisher":"https:\/\/www.facebook.com\/CertiSur","article_modified_time":"2023-05-02T19:50:50+00:00","twitter_card":"summary_large_image","twitter_site":"@CertiSur","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.certisur.com\/en\/news\/how-to-protect-from-phishing\/","url":"https:\/\/www.certisur.com\/en\/news\/how-to-protect-from-phishing\/","name":"How to protect from phishing - CertiSur","isPartOf":{"@id":"https:\/\/www.certisur.com\/en\/#website"},"datePublished":"2023-03-22T23:48:53+00:00","dateModified":"2023-05-02T19:50:50+00:00","description":"How to protect from phishing Follow these 10 tips and you will become a phishing defense expert.","breadcrumb":{"@id":"https:\/\/www.certisur.com\/en\/news\/how-to-protect-from-phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.certisur.com\/en\/news\/how-to-protect-from-phishing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.certisur.com\/en\/news\/how-to-protect-from-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"News","item":"https:\/\/www.certisur.com\/en\/news\/"},{"@type":"ListItem","position":2,"name":"How to protect from phishing"}]},{"@type":"WebSite","@id":"https:\/\/www.certisur.com\/en\/#website","url":"https:\/\/www.certisur.com\/en\/","name":"CertiSur","description":"","publisher":{"@id":"https:\/\/www.certisur.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.certisur.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.certisur.com\/en\/#organization","name":"CertiSur","url":"https:\/\/www.certisur.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.certisur.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.certisur.com\/wp-content\/uploads\/Logo-CertiSur-Signo-de-Confianza-300dpi-copy.png","contentUrl":"https:\/\/www.certisur.com\/wp-content\/uploads\/Logo-CertiSur-Signo-de-Confianza-300dpi-copy.png","width":3075,"height":2483,"caption":"CertiSur"},"image":{"@id":"https:\/\/www.certisur.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CertiSur","https:\/\/x.com\/CertiSur","https:\/\/www.youtube.com\/c\/TecnologaCertiSur"]}]}},"_links":{"self":[{"href":"https:\/\/www.certisur.com\/en\/wp-json\/wp\/v2\/pages\/6318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.certisur.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.certisur.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.certisur.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.certisur.com\/en\/wp-json\/wp\/v2\/comments?post=6318"}],"version-history":[{"count":0,"href":"https:\/\/www.certisur.com\/en\/wp-json\/wp\/v2\/pages\/6318\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.certisur.com\/en\/wp-json\/wp\/v2\/pages\/4975"}],"wp:attachment":[{"href":"https:\/\/www.certisur.com\/en\/wp-json\/wp\/v2\/media?parent=6318"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.certisur.com\/en\/wp-json\/wp\/v2\/categories?post=6318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}