Key Concepts
- Social Engineering
- The act of manipulating individuals into sharing confidential information or performing actions that may compromise security. These attacks rely on human behavior, such as trust, urgency, or curiosity.
- Phishing
- A cyberattack in which a malicious actor pretends to be a trusted source (such as a bank, company, or colleague) to steal login credentials, financial information, or other sensitive data through email or messages.
- Note: With the development of AI tools, modern phishing attempts appear more polished and convincing than in the past, making them harder to detect.
Common Cyber Threats
- Imposter Scams
- Scammers post as someone you trust - such as a coworker, supervisor, or organization - to convince you to send money or sensitive information
- Vishing (Voice Phishing)
- Fraud conducted over phone calls, where attackers attempt to gather personal or financial information
- Smishing (SMS Phishing)
- Scams delivered via text message, often including malicious links or urgent requests designed to prompt quick action
- QR Code Attacks (QRljacking)
- Malicious QR codes that direct users to fraudulent websites or capture login information when scanned
- Account Compromise
- Attackers gain access to legitimate accounts (such as Butler email account) and use them to send phishing messages, access financial or personal information, or send fraudulent requests. Because these messages come from real accounts, they may appear trustworthy.
What You Should Do
- Be cautious of unexpected or unusual messages, even from known contacts
- Verify requests using a separate, trusted method (e.g., phone call)
- Avoid clicking links or opening attachments unless you are confident they are safe
- Never share passwords, MFA codes, or sensitive information via email, text, or phone
- Report suspicious messages using the "Report Suspicious" button in Outlook
Key Takeaway
Cyber threats often rely on deception rather than technical complexity. Staying alert, verifying requests, and reporting suspicious activity are the best ways to protect yourself.
Resources:
Butler Provided Training:
Government Provided Information:
The Federal Trade Commission is a great source of information for each of these types of attacks. Following are links to their articles which provide helpful information if you would like to know what you can do to prevent these attacks or what to do if you have fallen victim to one.
FTC: How to Recognize and Avoid Phishing Scams
FTC: How to Avoid Imposter Scams
FTC: Scammers Hide Harmful Links in QR Codes to Steal Your Information
FTC: Phone Scams
FTC: Text Message Spam
The Federal Bureau of Investigation also provides information on Common Scams and Crimes, which can be located at this site.
Related Articles:
How to Report a Suspicious/Phishing Email
What do I do if my account is compromised? What if I click on a phishing email?
How can I tell if an email is real/legitimate/safe? Is it phishing/spam? What should I do?
Unwanted Texts (SMS) Messages