Security tips to avoid being a victim of vishing

Beware of everything that can happen to you just by answering a call. He vishing is a form of scam that is carried out through phone calls or voice messages that appear to be legitimate. Fraudsters use techniques of social engineering to impersonate a trusted entity, such as a bank, credit card company, or government agency, and obtain personal or financial information from the victim, such as account numbers, passwords, or personally identifiable information.

Be aware that scammers use previously stolen personally identifiable information to make the call appear even more legitimate and to persuade the victim to reveal additional information. It is important to exercise caution when receiving calls or voice messages from strangers, especially if they ask for personal or financial information.

How to avoid vishing

For this reason, Julio Seminario, a cybersecurity specialist at Bitdefendershared several recommendations to avoid being a victim of vishing.

  • Logic and verification of sources: having a good updated antivirus service and being logical when providing our personal information should be vital. Confidential data should never be given by any means, since no bank or company will ask us for this data.
  • Do not open suspicious messages: these are characterized by requests or requests for operations with embedded links of a suspicious nature. Let’s use our common sense, let’s rectify the spelling errors in the message and remember that payment cancellations are made through official means.
  • Be wary of calls for commercial reasons: if you are a company with which we are associated, it is advisable to call the official communication channels and verify the information received. If this is not the case, verify the source and check the reason for the call.
  • Block recurring numbers: in order to avoid insistence on identity theft and proceed to report the number to disable their next threats.

Remember that the attackers use our inexperience in browsing and the Internet to their advantage and act in two sequential steps: first, through phishing, they collect prior information from the victim; and, second, he makes a phone call, where he impersonates his identity with that of a bank, company or service person in order to generate bonds of trust and execute the fraud.

Listen Dale Play on Spotify. Follow the program every Monday on our available audio platforms.

Leave a Reply

Your email address will not be published. Required fields are marked *