Get Help Now
CONTACT US

From the Cybersecurity News Desk

Keep Your Sensitive Information Safe This Holiday Season

Contribution by GreyCastle’s Mike Liebro, Director of Information Security 

With the Holiday Season going on, people are planning to celebrate this year. It’s this time of year when people take time off work to buy gifts or travel, but there is a potential risk that everyone needs to be aware of. There are more vulnerable people at the end of the year when everyone is in a “giving” spirit which is why cyber attacks seem to become more frequent at the end of the year.

Holiday phishing tricks people into giving out personal information. 38% of people have reported seeing an influx of these phishing attempts and they disguise themselves as holiday sales, free products/gift cards, and order confirmations for things you didn’t buy in the form of emails. 

As we approach the holidays, stay vigilant about where you click!  If you didn’t order it, it probably isn’t real. This article is about how to help spot phishing emails and how to inspect SMS URL links before clicking. In the meantime, keep the following rules in mind for potential phishing emails.  These are often emails that –

  • Are not addressed to you by name.    
  • Appear to be from a legitimate company but use poor English or omit personal details that a legitimate sender would include.    
  • Are from businesses that you were not expecting to hear from, and/or    
  • Take you to a landing page or website that is not the legitimate URL of the company the email is purporting to be sent from.       

Please take a moment and back away from your mouse and think about what you are doing before you click and PAUSE before entering any credentials into a website. Be sure it is legit.

See How We Can Help!

Fill out this form and we’ll be in touch shortly

    Industry - select one:

    Through our comprehensive approach to cybersecurity, we’ll help ensure your organization is protected against evolving threats like sophisticated phishing attempts.

    CYBER OPERATIONS

    Be Proactive with Penetration Testing

    We can reveal if there are weaknesses in your systems.

    Be Aware of Hidden Cyber Risks

    Be aware and understand your top risks like never before.

    Cybersecurity Incidents Happen

    Plan, prevent, and mitigate with our incident response team.

    View expert analysis on the latest threats 

    Finding qualified security professionals can be difficult and costly.

    Ours are the best. Put them to work for you.

    Contact Us
    Privacy Settings
    We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
    Youtube
    Consent to display content from Youtube
    Vimeo
    Consent to display content from Vimeo
    Google Maps
    Consent to display content from Google
    Spotify
    Consent to display content from Spotify
    Sound Cloud
    Consent to display content from Sound
    Contact Us