Together, let’s #BanTheScam!
In the world of cybersecurity, threats and scams are abundant. Many come in the form of a phishing attack, a cybercrime that relies on manipulation and deceit to lure victims into revealing personal details and other sensitive information. Phishing is initiated through various ways, with SMS, email, and voice mail being the top platforms.
Watch out for the three stages of a phishing attack
A targeted one has attackers using highly personalized messages using information they discover about the specific victim they have targeted. This type of attack usually targets more high-level employees.
Let’s #BanTheScam together
You are the first line of defense in enforcing cybersecurity! Here are a few tips to help you protect yourself and Teleperformance:
Think before you click! Never click on a link from an unknown source. Always check the messages multiple times before making a move.
Pay attention to the sender or caller. Look for any inconsistencies in spelling, email addresses, or how instructions are phrased.
Lock it up
Keep your sensitive information to yourself! Don’t share your login details, passwords, OTPs, and bank or credit information with anyone.
Be smart online
Be mindful of what you post on social media. Make sure you don't post your location and cover up any identifying personal details.
Turn on stranger danger
Avoid replying to text messages or emails from unknown senders. Be wary of callers asking for personal data.
Listen to our podcast featuring Jeff Schilling, Global Chief Information Security Officer at Teleperformance.
Understand the types of phishing to avoid the scammers’ baits
Scammers send emails that appear legitimate but contains a link to a fake website.
Scammer use gathered information about the victims to create personalized messages designed to bait them into providing more data.
Scammers call victims or leave voice messages to trick them into sharing passwords, OTPs, and other data.
Scammers pose as a legitimate company offering a gift or voucher in exchange for providing personal information.
Attackers pretend to be from an IT service and ask victims to click on a link sent via email or SMS.