What is a Phishing Attack?
Verify any requests from institutions that arrive via email over the phone. If the email itself has a phone number, don’t call that number, but rather one you find independently online or within documentation you’ve received from that company.
Most companies are adamant that they will not ask for personal information via email. At the same time, most companies strongly recommend that users not make sensitive information available.
While it might seem like a pain to make a phone call to find out if something is legitimate, the hassle of having your Social Security number or PIN stolen is worse.
Cyber attacks are being performed every second of every day.
You must review your current Cyber defences and continue to have them tested by professional organisations.
View the CYBER ATTACK video