{"id":2710,"date":"2023-12-07T18:46:06","date_gmt":"2023-12-07T18:46:06","guid":{"rendered":"https:\/\/fresk.app\/?p=2710"},"modified":"2024-01-04T14:39:03","modified_gmt":"2024-01-04T14:39:03","slug":"8-things-you-can-do-to-protect-yourself-against-phishing-attempts","status":"publish","type":"post","link":"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/","title":{"rendered":"8 things you can do to protect yourself against phishing attempts"},"content":{"rendered":"\n<p>Pandemics, teleworking, wars and economic fluctuations are driving up cyber attacks. Companies are prime targets for hackers. Unfortunately, very few employers make employees aware of this threat. And yet, one of the most important breaches of information systems remains the human being. Discover some simple strategies you can implement today to reduce your risk of fraud or theft.<\/p>\n\n\n<h3>\u00a0<\/h3>\n<h3><strong>Screen incoming calls<\/strong><\/h3>\n<p>Use call filtering services to block potentially fraudulent or unwanted numbers. Software solutions such as Frsk can identify and block these calls before they reach your employees.<\/p>\n<p>\u00a0<\/p>\n<h3><strong>Caller authentication<\/strong><\/h3>\n<p>Implement authentication procedures for sensitive calls or requests for confidential information. Establishing a caller verification process can prevent phishing attempts.<\/p>\n<p>\u00a0<\/p>\n<h3><strong>Call recording<\/strong><\/h3>\n<p>Call recording can be useful for documenting important conversations, especially those involving financial transactions or sensitive information.<\/p>\n<p>\u00a0<\/p>\n<h3><strong>Use of internal or protected numbers<\/strong><\/h3>\n<p>Encourage the use of internal numbers or direct lines for internal communications and with trusted partners. Limiting access to external numbers can reduce risks.<\/p>\n<p>\u00a0<\/p>\n<h3><strong>Telephone security training<\/strong><\/h3>\n<p>Integrate specific training modules on telephone security into the security awareness program. Include examples of telephone phishing techniques and measures to counter them.<\/p>\n<p>\u00a0<\/p>\n<h3><strong>Call monitoring<\/strong><\/h3>\n<p>Implementing monitoring tools to detect suspicious call patterns or unusual behavior during telephone conversations can be very useful in spotting fraudulent activity.<\/p>\n<p>\u00a0<\/p>\n<h3><strong>Uspicious call response policy<\/strong><\/h3>\n<p>Establish clear procedures on how to handle suspicious or potentially dangerous calls. Encourage employees to report any calls they find suspicious.<\/p>\n<p>\u00a0<\/p>\n<h3><strong>Telephone system updates<\/strong><\/h3>\n<p>Ensure that the company\u2019s telephone systems are regularly updated with the latest security patches to avoid exploitable loopholes.<\/p>\n<p>By implementing these specific strategies to strengthen the security of telephone communications, a company can reduce the risks associated with phishing attempts over the phone and protect its sensitive data.<\/p>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pandemics, teleworking, wars and economic fluctuations are driving up cyber attacks. Companies are prime targets for hackers. Unfortunately, very few employers make employees aware of this threat. And yet, one of the most important breaches of information systems remains the human being. Discover some simple strategies you can implement today to reduce your risk of [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":2689,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2710","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>8 things you can do to protect yourself against phishing attempts<\/title>\n<meta name=\"description\" content=\"Pandemics, teleworking, wars and economic fluctuations are driving up cyber attacks. Companies are prime targets for hackers. Unfortunately, very few employers make employees aware of this threat.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 things you can do to protect yourself against phishing attempts\" \/>\n<meta property=\"og:description\" content=\"Pandemics, teleworking, wars and economic fluctuations are driving up cyber attacks. Companies are prime targets for hackers. Unfortunately, very few employers make employees aware of this threat.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/\" \/>\n<meta property=\"og:site_name\" content=\"Fresk\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-07T18:46:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-04T14:39:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fresk.app\/wp-content\/uploads\/2023\/12\/phishing-telephone-attaquant-e1701975051536.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2146\" \/>\n\t<meta property=\"og:image:height\" content=\"1397\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fresk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fresk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/\"},\"author\":{\"name\":\"Fresk\",\"@id\":\"https:\/\/fresk.app\/en\/#\/schema\/person\/ba93cb2a176310b69cd05a60a269d341\"},\"headline\":\"8 things you can do to protect yourself against phishing attempts\",\"datePublished\":\"2023-12-07T18:46:06+00:00\",\"dateModified\":\"2024-01-04T14:39:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/\"},\"wordCount\":296,\"publisher\":{\"@id\":\"https:\/\/fresk.app\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/fresk.app\/wp-content\/uploads\/2023\/12\/phishing-telephone-attaquant-e1701975051536.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/\",\"url\":\"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/\",\"name\":\"8 things you can do to protect yourself against phishing attempts\",\"isPartOf\":{\"@id\":\"https:\/\/fresk.app\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/fresk.app\/wp-content\/uploads\/2023\/12\/phishing-telephone-attaquant-e1701975051536.jpg\",\"datePublished\":\"2023-12-07T18:46:06+00:00\",\"dateModified\":\"2024-01-04T14:39:03+00:00\",\"description\":\"Pandemics, teleworking, wars and economic fluctuations are driving up cyber attacks. Companies are prime targets for hackers. Unfortunately, very few employers make employees aware of this threat.\",\"breadcrumb\":{\"@id\":\"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/#primaryimage\",\"url\":\"https:\/\/fresk.app\/wp-content\/uploads\/2023\/12\/phishing-telephone-attaquant-e1701975051536.jpg\",\"contentUrl\":\"https:\/\/fresk.app\/wp-content\/uploads\/2023\/12\/phishing-telephone-attaquant-e1701975051536.jpg\",\"width\":2146,\"height\":1397,\"caption\":\"Anonymous computer hacker in white mask and hoodie. Obscured dark face using laptop computer for cyber attack and calling on cellphone, Data thief, internet attack, darknet and cyber security concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/fresk.app\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"8 things you can do to protect yourself against phishing attempts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fresk.app\/en\/#website\",\"url\":\"https:\/\/fresk.app\/en\/\",\"name\":\"Fresk\",\"description\":\"T\u00e9l\u00e9phonie d\u2019affaires intelligente et communication unifi\u00e9e\",\"publisher\":{\"@id\":\"https:\/\/fresk.app\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fresk.app\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/fresk.app\/en\/#organization\",\"name\":\"Fresk\",\"url\":\"https:\/\/fresk.app\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/fresk.app\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/fresk.app\/wp-content\/uploads\/2022\/12\/cropped-fresk-site.png\",\"contentUrl\":\"https:\/\/fresk.app\/wp-content\/uploads\/2022\/12\/cropped-fresk-site.png\",\"width\":1101,\"height\":262,\"caption\":\"Fresk\"},\"image\":{\"@id\":\"https:\/\/fresk.app\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/fresk.app\/en\/#\/schema\/person\/ba93cb2a176310b69cd05a60a269d341\",\"name\":\"Fresk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/fresk.app\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d3841d4cc20afc3c1cfca52cb102562?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d3841d4cc20afc3c1cfca52cb102562?s=96&d=mm&r=g\",\"caption\":\"Fresk\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"8 things you can do to protect yourself against phishing attempts","description":"Pandemics, teleworking, wars and economic fluctuations are driving up cyber attacks. Companies are prime targets for hackers. Unfortunately, very few employers make employees aware of this threat.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/","og_locale":"en_US","og_type":"article","og_title":"8 things you can do to protect yourself against phishing attempts","og_description":"Pandemics, teleworking, wars and economic fluctuations are driving up cyber attacks. Companies are prime targets for hackers. Unfortunately, very few employers make employees aware of this threat.","og_url":"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/","og_site_name":"Fresk","article_published_time":"2023-12-07T18:46:06+00:00","article_modified_time":"2024-01-04T14:39:03+00:00","og_image":[{"width":2146,"height":1397,"url":"https:\/\/fresk.app\/wp-content\/uploads\/2023\/12\/phishing-telephone-attaquant-e1701975051536.jpg","type":"image\/jpeg"}],"author":"Fresk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fresk","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/#article","isPartOf":{"@id":"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/"},"author":{"name":"Fresk","@id":"https:\/\/fresk.app\/en\/#\/schema\/person\/ba93cb2a176310b69cd05a60a269d341"},"headline":"8 things you can do to protect yourself against phishing attempts","datePublished":"2023-12-07T18:46:06+00:00","dateModified":"2024-01-04T14:39:03+00:00","mainEntityOfPage":{"@id":"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/"},"wordCount":296,"publisher":{"@id":"https:\/\/fresk.app\/en\/#organization"},"image":{"@id":"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/#primaryimage"},"thumbnailUrl":"https:\/\/fresk.app\/wp-content\/uploads\/2023\/12\/phishing-telephone-attaquant-e1701975051536.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/","url":"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/","name":"8 things you can do to protect yourself against phishing attempts","isPartOf":{"@id":"https:\/\/fresk.app\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/#primaryimage"},"image":{"@id":"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/#primaryimage"},"thumbnailUrl":"https:\/\/fresk.app\/wp-content\/uploads\/2023\/12\/phishing-telephone-attaquant-e1701975051536.jpg","datePublished":"2023-12-07T18:46:06+00:00","dateModified":"2024-01-04T14:39:03+00:00","description":"Pandemics, teleworking, wars and economic fluctuations are driving up cyber attacks. Companies are prime targets for hackers. Unfortunately, very few employers make employees aware of this threat.","breadcrumb":{"@id":"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/#primaryimage","url":"https:\/\/fresk.app\/wp-content\/uploads\/2023\/12\/phishing-telephone-attaquant-e1701975051536.jpg","contentUrl":"https:\/\/fresk.app\/wp-content\/uploads\/2023\/12\/phishing-telephone-attaquant-e1701975051536.jpg","width":2146,"height":1397,"caption":"Anonymous computer hacker in white mask and hoodie. Obscured dark face using laptop computer for cyber attack and calling on cellphone, Data thief, internet attack, darknet and cyber security concept."},{"@type":"BreadcrumbList","@id":"https:\/\/fresk.app\/en\/8-things-you-can-do-to-protect-yourself-against-phishing-attempts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fresk.app\/en\/"},{"@type":"ListItem","position":2,"name":"8 things you can do to protect yourself against phishing attempts"}]},{"@type":"WebSite","@id":"https:\/\/fresk.app\/en\/#website","url":"https:\/\/fresk.app\/en\/","name":"Fresk","description":"T\u00e9l\u00e9phonie d\u2019affaires intelligente et communication unifi\u00e9e","publisher":{"@id":"https:\/\/fresk.app\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fresk.app\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/fresk.app\/en\/#organization","name":"Fresk","url":"https:\/\/fresk.app\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/fresk.app\/en\/#\/schema\/logo\/image\/","url":"https:\/\/fresk.app\/wp-content\/uploads\/2022\/12\/cropped-fresk-site.png","contentUrl":"https:\/\/fresk.app\/wp-content\/uploads\/2022\/12\/cropped-fresk-site.png","width":1101,"height":262,"caption":"Fresk"},"image":{"@id":"https:\/\/fresk.app\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/fresk.app\/en\/#\/schema\/person\/ba93cb2a176310b69cd05a60a269d341","name":"Fresk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/fresk.app\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d3841d4cc20afc3c1cfca52cb102562?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d3841d4cc20afc3c1cfca52cb102562?s=96&d=mm&r=g","caption":"Fresk"}}]}},"_links":{"self":[{"href":"https:\/\/fresk.app\/en\/wp-json\/wp\/v2\/posts\/2710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fresk.app\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fresk.app\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fresk.app\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/fresk.app\/en\/wp-json\/wp\/v2\/comments?post=2710"}],"version-history":[{"count":12,"href":"https:\/\/fresk.app\/en\/wp-json\/wp\/v2\/posts\/2710\/revisions"}],"predecessor-version":[{"id":2996,"href":"https:\/\/fresk.app\/en\/wp-json\/wp\/v2\/posts\/2710\/revisions\/2996"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fresk.app\/en\/wp-json\/wp\/v2\/media\/2689"}],"wp:attachment":[{"href":"https:\/\/fresk.app\/en\/wp-json\/wp\/v2\/media?parent=2710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fresk.app\/en\/wp-json\/wp\/v2\/categories?post=2710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fresk.app\/en\/wp-json\/wp\/v2\/tags?post=2710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}