PHISHING ATTACK

TIPS FOR RECOVERY FROM A PHISHING ATTACK

Software

PHISHING ATTACK

There are so many things that we can do to reduce the impact of a successful phishing attack. But like various things in information security, there is no possibility to completely eliminate the risk, so it’s important to proactively prepare an effective response strategy. 

Alert the Company

You must also notify the company that was specified in the phishing email about your experience. It may help them secure others from taking up the same fate. They must be provided with a method in place to help you when you contact them. Sometimes they might want you to forward the infected email to an exclusive email.

You can check the full email including header information which can provide a hint. In Google Gmail you can choose “Show Original” option. That’s the reason why the company might ask you to send the email.

Check for the source

  • Make sure you get a pretty good idea where the scam originated.
  • If it is through email then re-think if you clicked on a link in that email.
  • Also pay attention when something strange happened while you were surfing the web.
  • Also realize when you get a pop up that you clicked on.
  • Most importantly ensure if it is a phone call or text

Reporting Promptly

Having a general idea of where the phishing scam has originated from goes a long way! You should report it and concentrate on corrective actions.

Now that you’ve gathered yourself and have a clearer focus, let’s begin the reporting process. If you have a membership with any of the trusted Identity Theft services, you may have the ability to approach them to automate the cancellation of credit cards, ordering new ones, etc.

Also contact your ISP. If you believe the infiltration occurred while you were on a social media website, contact them as well.

Scan your system

Once you have secured your system, proceed with a complete scan to make sure the attacker did not install any malware or backdoor software on the device to plan future attacks.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.