Skip to main content

How to avoid "Phishing"

The Internet is an ocean of opportunities. In many cases, this maxim also applies to malicious users. That's why, as we navigate these waters, the rule should be the same as always: prioritise our security.

In other words, we should avoid taking certain baits, no matter how appetising they may seem. If we give in to curiosity, we could be the perfect victims of a typical attack in these seas: "phishing".

The name gives away the danger: "phishing" comes from the English word for "fishing" and happens when cybercriminals try to do just that: "fish" for confidential information, such as bank details or passwords, for example. Of course, these scams have negative consequences, but there are ways to be aware of them and avoid the wrong hooks. We should adopt six behaviours to avoid falling prey to these invaders.

Six useful tips

Always be wary

Email is one of the most popular places for phishing, but there are other ways in which attacks can take place: Phone calls, SMS, WhatsApp, Facebook and other networks. Whichever application you use, always be wary of messages and check that the sender's addresses are reliable - without ever opening any links or attachments. Also, remember that a trustworthy institution never requests personal data in these ways.

Use password managers

Using a secure password is fundamental to strengthening your online security. Filling in a login form automatically is a good help, but you can go further with so-called "password managers". This software allows you to create ultra-secure and different passwords for each website you use. Don't worry: you won't need to resort to memory. The tools save passwords so you can retrieve them whenever you want.

Search for errors

In most cases, those responsible for phishing attacks try to lend credibility to the messages they send by using the visual identity of trusted institutions. But, as a rule, these hackers become victims of their ingenuity. Look for errors in the visual appearance and texts you receive: misaligned items, poor-quality images, spelling or grammar mistakes, or missing elements such as signatures. These elements give the attackers away. You know the next step: report and delete the message.

Validate links

We want to point out that we're not recommending that you enter the link - that would be putting your foot in the trap. There is a trick that will help you know if you're looking at a trustworthy address. And it's straightforward: hover your cursor over the link - again, without clicking - and see the "real" link. If it's suspicious, delete the message immediately.

Resisting threats and easy advantages

Cybercrime is often committed with a certain amount of emotional pressure attached. To get people to do what they want, attackers create messages that arouse a sense of urgency or an unmissable opportunity. So always be suspicious and resist threats of missing payments, for example, or offers that are too enticing. It's a scam.

Use antivirus

This is an additional barrier to cyber-attacks. Although it doesn't guarantee total immunity, using antivirus, anti-spyware, and firewall programs will ensure excellent protection for the devices you use in your day-to-day life, especially your computer.