Vishing

7th January 2020 | Cybrary Vishing


Vishing is the fraudulent practice of making phone calls or leaving voice messages pretending to be from reputable companies in order to have individuals give out personal information, up to and including banking or credit card numbers. This is similar to phishing, but vishing is conducted over the phone instead of email.  In recent years, vishing has been combined with website hacks that display a virus warning from “Microsoft” and ask you to call the Microsoft Support line to remove the virus immediately or suffer DIRE consequences.  This combined attack preys on the elderly and less computer savvy individuals and has cost consumers millions of dollars.

What can your SMB do?

Vishing is on the rise, nearly half (49%) of information security businesses experienced vishing in 2018. Vishers will keep attacking due to the lack of knowledge of the threat by the general public, according to ProofPoint, 63% of the public they surveyed had no clue what vishing was. What can be done? 

  1. Train your employees on how to spot and avoid vishing attacks. 
  2. Register with a paid robocall blocking service
  3. Inform your company’s IT department about any potential scam calls or emails.
  4. File an official complaint with the FTC and local, state, or federal law enforcement agencies.

Related Terms: Phishing, Spear-Phishing, Smishing, Whaling

Source: Oxford Dictionary

To understand more about Vishing, watch this video of a recreated vishing call:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Cybersecurity Leader Uploads Sensitive Files to AI

Cybersecurity Leader Uploads Sensitive Files to AI

Not surprising when Trouble Ensues Last summer, the interim head of a major U.S. cybersecurity agency uploaded...

Read more
Common Google Workspace Security Gaps

Common Google Workspace Security Gaps

And How to Fix Them Let me make an educated guess. You moved to Google Workspace because it was supposed to...

Read more
MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

Remember Heartbleed? That security nightmare from a few years back that made everyone panic about their...

Read more