Reflection Paper

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

DECEIT VERSUS LEGIT: SAFEGUARDING THE KEY

REFLECTION PAPER
By: Elaiza Kathlyn Gangani | Bachelor of Science in Accountancy II
Divine Word College of Laoag
Laoag City, Ilocos Norte

With the development of different technology, society will have more power today and in the future.
While many people have access to personal technology, only few are actually aware of the different ways
on how identity theft could happen online. The present digital era, where technology has taken root, is rife
with identity crimes like phishing attacks, and many people are falling victim to them. If we lack enough
information about it, the worst-case scenario might happen. Are we going to allow the rod and bait to
catch us? Or are we going to do something and act so that we could prevent the rod from catching us?

Similar to how a fisherman uses bait to catch a fish, an attacker pulls the victim in by seeming to be a
reliable source and making an alluring request. Phishing is the term used to describe an attempt to get
private information,usually in the form of usernames, passwords, credit card numbers, bank account
information, or other vital information, with the intention of using or selling the information obtained.
Delivering false messages that appear to be from a reputable and trustworthy source is the practice of
phishing, which is commonly done by email and text messaging. Using the victim's device, the attacker
hopes to steal money, private information, and login passwords or to install malware. Phishing is a
dangerous, fatal, and more common type of cybercrime. As a result of phishing attacks, many users and
organizations have had their personally identifiable information, login credentials, and sensitive data
stolen. This has led to identity theft, financial loss, reputational damage, the loss of intellectual property,
and the disruption of daily routine operational activities. Despite the fact that phishing schemes are
becoming more complex, there are several warning signs you should watch out for to protect yourself.
Attackers won't ask for crucial information directly in an email these days. When receiving emails
requesting your or your company's information for urgent concerns, it is always a good idea to reconsider
your next move. The sender of an email who threatens terrible consequences if you do not instantly
disclose or confirm financial information should not be taken seriously. If you are the target of an attack,
defend yourself right away. Send an alert to your financial institution. Add a fraud alert to your credit
reports. Keep a watchful eye on your account statements and credit reports. It's critical that you can
recognize and respond quickly to phishing attacks in case you are unlucky enough to fall prey to one. By
automatically warning on unusual user activity and unauthorized file changes, a data security platform
relieves some of the load on the IT/Security team. Data security platforms can assist in locating the
affected account if an attacker has gained access to your sensitive information, allowing you to take action
to stop future harm. Phishing attacks have been more frequent in recent years, and they continue to pose a
serious threat to both people and businesses. A number of new phishing attack trends in 2022 changed the
security environment, highlighting the need for ongoing attention and preventative actions to fend against
these dangers. In order to avoid falling victim to these nefarious schemes, it is essential to be educated
and knowledgeable enough about the most recent phishing attack strategies and best practices.

With businesses increasingly going digital, phishing avoidance has become essential as scammers
use these attacks to steal sensitive data from businesses and individuals. Since phishing attacks can be
automatically detected and eliminated by installing various anti-phishing software, it is essential for
business organizations to perform security awareness training on a regular basis. At the end of the day, the
goal of every individual and organization is they should not let the fish rod and bait from catching them.

You might also like