Call Today

+1 440-322-ILER(4537)

}
Hours

Mon – Fri, 9am to 5pm

Tech Blog

your go-to resource for all things tech! Stay updated on the latest trends, industry insights, and expert tips to navigate the ever-evolving world of technology.

Vishing

by | Jul 2, 2020

Voice phishing also known as “vishing” is an electronic modern form of theft. This method does not typically occur over the internet, it is carried out by voicemail, VoIP, landline and cellular phones. The primary goal of this attack is to extract victims personal, private and financial information. Many financial institutions are arguing that accountability must be placed on the target as well for not actively protecting their own accounts. Furthermore, banks are declining to refund money to the victims due to “negligence” by not assuring their own bank security.

Most often the target receives a message indicating there has been fraudulent or suspicious activity on their credit cards, bank account, mortgage, or other financial institutions. Victims are told to call back a specific number and they will need to provide information in order to “verify their identity” or to “ensure fraud does not occur”. Caller ID spoofing is another tactic frauds are using to trick their victims into thinking the call is coming from a legitimate source such as a financial institution or government agency. This type of scam is typically difficult to trace, especially when executed through VoIP. Vishing scams, like many other real customer service companies, are outsourced to other countries, making law enforcement powerless.

If an unsolicited message suggests you are a target of illegal activity, no matter the source, don’t call the provided number. The consumer should call the establishment named, using a number that is familiar, to ensure the account has not been tampered with. There are ways to protect yourself, listed below. In many cases, callers may claim to be experts or authorities in a certain field. They may pretend to be computer technicians, bankers, police, or even victims themselves.

If you do answer the phone, the moment you suspect it might be a vishing call, end the call immediately. Do not speak to or otherwise engage the caller. There are vishing schemes in which the sole purpose is to record the victim’s voice for later use in navigating voice-automated phone menus tied to the victim’s accounts. However, if you are unsure, there are ways to tell if the caller is legitimate. It is not difficult to authenticate a caller’s professional affiliation with a phone call. If the caller claims they cannot — or will not — provide the information asked for to verify their identity, they cannot be trusted. If the caller does provide contact information, it is still important to actually verify their legitimacy by using an official phone number available to the public to call the organization in question.

If you follow these tips and stay cautious, you will be safe from vishing scams. Just remember to verify the callers and never give out personal information.

With so many new scams out there, it is critical to raise awareness about these types of attacks and to take the proper steps in addressing the conflict.  For questions or concerns give us a call at
440-322-ILER (4537)

Suspect Your Computer Has Been Hacked? Do These 5 Things Now!

The initial reaction when you suspect your computer or network has been compromised is to panic. However, if your network has been breached, what you do next can make the difference between the incident being a minor inconvenience and being a devastating disaster that...

3 Cyber Security Myths That Will Hurt Your Business This Year

Working amid the ever-changing currents of technology and cyber security, businesses often find themselves entangled in a web of misinformation and outdated ideas. But failing to distinguish between myth and fact can put your business’s security at serious risk. Based...

3 Technology End-of-Service Myths

It's crucial to keep all software and hardware up to date to maintain optimal security. If you don’t, cybercriminals can easily infiltrate your network and the chances for downtime increase significantly. However, many businesses don't realize that expired...

Did you know hardware and software expire too?

We are all aware of the term “use by date.” It is regularly used when talking about food and medications and refers to the date after which the product is no longer safe to consume. However, did you know that your software and hardware can expire too? This is because...

Top 9 Benefits of Outsourcing Your Cybersecurity

When it comes to protecting your business from cyber threats, having the right tools and technology is only half the battle. You also need the expertise, controls, and processes to manage and mitigate these threats effectively. That’s where a managed security service...