Connect with us

Hi, what are you looking for?


Account protection is essential in avoiding phishing attacks

Fraudsters can easily get your passwords that allow them to go through your sensitive information or files. Usually, the same password is used for mobile banking. Thus, when they pose as bank representatives and convince you to give your OTP, they now have access to your online banking accounts.

More often than not, phishing is likened to a simple hacking. However, it is more than that. These attacks can be avoided when people know and understand what data should be protected.

“Data is like gold we need to protect, especially for professionals and businesses,” Jaypee Soliman, UnionBank VP/MSME Segment Head, mentioned as he talked about phishing at the ACACI PH 37th Annual National Convention, Technical Session 5: Prevent Cyber-Attacks: What Accounting Professionals Need to Know.

Phishing is defined as “a fraudulent practice of sending e-mails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.” In reality, fraudsters are “pretending to be from huge companies, and that they need your personal information. Once you have given usernames or passwords, they have several ways to hack into your accounts.” 

For example, phishing can happen through compromised emails. Fraudsters can easily get your passwords that allow them to go through your sensitive information or files. Usually, the same password is used for mobile banking. Thus, when they pose as bank representatives and convince you to give your OTP, they now have access to your online banking accounts.

Advertisement. Scroll to continue reading.

Phishing has evolved greatly in this age of social media. It is no longer limited to emails as it can be done through popular sites like Facebook, Instagram, or Twitter. These can be through bogus promos or ads that you come across as you scroll your timeline. To protect yourself, you must scrutinize the details of the post, such as spelling, grammar, and even the links posted, as suspicious-looking details almost always leads to unscrupulous activities online. 

Scammers also do phishing through SMS or “smishing” and Voice calls or “vishing”. In these, they try to attack your emotions — either scare you or guilt you into giving up your sensitive financial details. They convince you to act urgently and disclose you card or banking details, pretending that someone is trying to make an unauthorized transaction using your card or bank account. 

Smishing often happens with a fraudster sending a message with a clickable URL. When clicked, these links direct you to a website prompting you to enter your details, including sensitive ones. Once done, cybercriminals can now use these to access your accounts and steal money or more data. 

Soliman walked through the steps that professionals and businesses should know to avoid falling victim to these phishing attacks. 

First, understand the entry points or gateways where fraudsters can get in, such as an email. Each and every access point is a potential entry point of threats.

Advertisement. Scroll to continue reading.

Second, have an early detection system. Depending on the strategy of the company, it can be an internal communication system where threats are recognized. 

Third, have a response mechanism. This may vary depending on what industry the company belongs to. 

Have a solid communications system. This helps get information about potential threats inside the company that also extend to the customers.

Lastly, have a recovery plan. This is your strategy on how to treat intrusions, how to block or even eliminate these threats.

Soliman also recommends the following:

Advertisement. Scroll to continue reading.
  1. Don’t share sensitive info to other people;
  2. Think before you click;
  3. Enable multifactor authentication 
  4. Don’t use the same passwords across platforms and emails especially for mobile banking;
  5. Choose a reputable email provider;
  6. Only shop in reputable sites;
  7. Keep your devices and software updated

In addition, to monitor if data has leaked out of your accounts:

  1. Check if your e-mail is compromised thru 
    • See the sites or apps where your information is compromised
    • If there are any, best thing to do is change passwords
    • Or even delete or deactivate apps or software you do not use anymore
  2. Check all your online accounts
    • Check your recent activity, or log-in activity
    • If there are irregularities, respond right away by calling the platform to block devices using your account 


Like Us On Facebook

You May Also Like


Their results - published in the US journal ‘Cyberpsychology, Behaviour and Social Networking’ - suggest that just one week off social media improved individuals’ overall...


Disclosed during the recently held next@acer 2022 global event, the eco-friendly product lineup consists of two laptops, an all-in-one desktop, a projector, monitors and...


With 84 availability zones in 27 regions, Alibaba Cloud, the digital technology and intelligence backbone of Alibaba Group, provides IT services to millions of customers...


Roger Salazar, R1’s newly appointed country manager and respected BPO industry veteran with more than 30 years of experience, says, “We believe that the...


Kaspersky has once again completed a Service Organization Control for Service Organizations (SOC 2) Type 1 audit, conducted by an international Big Four accounting...

HEADLINES logged over 2.3 million pageviews in April 2022 alone, while reached over 77.9 million pageviews in the same month. Local NBA content...


With the “Don’t Miss Out” tile, subscribers can expect sensational perks and customized value-packed offers that are refreshed on a weekly basis and made...


SAS’ cloud momentum is building: Despite the pandemic’s pressure and uncertainty, SAS’ global cloud revenue jumped 19% in 2021. With results like this, SAS...