Phish Use the Phone Too
RSSFeed, System, ZList

Phish Use the Phone Too

Read Time: 1 min

In recent weeks, Information Systems received several reports of telephone scams and phone phishing attempts in the network. While email is the primary source of phishing, the number of attempts coming through direct contact is rising.

These phishing attempts can come in multiple ways:

  • an individual posing as an authorized person contacting you
  • an automated message directing you to press a number before giving information about who is calling

ThinkstockPhotos-158258704

To help detect a phishing call, ask the questions below:

  • Who is calling and why? – Many examples include people contacting you, posing as a security expert and walking you through steps that grant them access to your system. Instead of fixing problems, they will likely install harmful software.
  • What is the hurry? – Fast talkers who use high-pressure tactics are likely hiding something. Take your time and validate that the call is legitimate.

If you receive a call that seems suspicious, or if they attempt any work on your computer, validate their contact information. If they start to escalate the call, are evasive, or pressure you, hang up and call iSupport at extension 44500.

August 26, 2015
ABOUT K-NEWS

Kettering Health employees’ hub for system updates, stories about our people, events, and more.