Blog

New Cyber Threats: The Emergence of Vishing

Vishing describes attempts by hackers to gain access to sensitive data like passwords, account numbers, and sensitive financial details using voice communications. The term is a mashup of voice and phishing, which hackers use to gain personal data and login credentials. As a leading NJ Cyber Insurance provider, we see vishing attacks as a growing cybercrime threat.

In vishing attacks, scammers use the phone to engage in social engineering to discover personal information, account numbers, and passwords. They make believable claims that an account or Virtual Private Network (VPN) is hacked and offer to fix the problem with an install that contains malware software.

Scammers use VPNs, automated voice technology, and Voice over Internet Protocol (VOIP) to prey on vulnerable remote employees, tricking them into believing they must create new login credentials. With access to a corporate network, they continue with additional social engineering attacks to steal valuable information and next-level access.

Hackers often use psychology, threats, and persuasive dialog to intimidate victims into providing the information they seek. Some use threats and strong language to imply they are good guys who want to make their victims think they have advice on avoiding criminal charges or keeping their bank accounts from forced closure, and more.

Social engineering is the centerpiece of vishing hacks. Hackers usually start by impersonating bank personnel, official government representatives, or tech support. Sometimes the call is to congratulate their victim for winning a phony prize or sweepstakes.

The goal is to gain trust and leverage it to obtain their information to access an account or network to carry on their hacking attack. Scammers use VOIP and other technology to show the same area code or the name of a bank, tech suppliers like Microsoft, Amazon, or other well-known entities.

Tips to Stay Safe and Avoid Vishing and Phishing Attacks.

Following this advice will help thwart most vishing attempts.

Keep Your Confidential Information Safe.

Refuse requests to supply personal information on the phone. Trustworthy institutions do not make outreach calls to ask for your personal information.

Listen Carefully and Skeptically.

Please pay close attention to the caller and any threats, concerns, or requests they make. Refuse to provide personal information, including declining requests to confirm a mailing address or other information. Be super suspicious of calls where threats and or urgent requests to act or provide information.

Never Confirm Any Personal or Account Information.

Be wary of any phone numbers the caller gives you to confirm their identity. Look up the phone number yourself and call the number using a different phone. Cybercriminals can route phone numbers and create fake numbers.

Use Voicemail to Screen Calls.

Don’t believe what your eyes see when looking at the caller’s phone number or the information shown on your caller ID. For unknown numbers, it’s a good practice to send the call to voicemail so you can listen to it uninterrupted.

Don’t Answer Any Questions.

Avoid answering questions seeking personal and workplace information, even your home address or phone number. Instead, ask the caller to prove who they are. If you receive pushback or the caller is uncooperative with your request, hang up on them.

Don’t Comply with Any Requests. 

Many automated messages ask for voice replies or to press buttons to answer questions. It’s human nature to be helpful, but don’t do it. Hackers may record your voice to use to help them answer prompts in your accounts. Pressing numbers confirms a live person answers and complies with requests.

Use Outbound Communication to Verify Identities.

Hackers are proficient because they have a lot of practice. Some can make a compelling case to lure you into the scheme. If you have concerns and want to follow up, do it by researching the company’s phone numbers to call back and verify if your caller is legitimate.

Join the Do Not Call Registry.

Use the free government-sponsored National Do Not Call Registry. Go to the website to add your landline and mobile phone numbers to the registry to tell telemarketers not to call you. Some organizations like charities and political groups are exempt, and crooks don’t pay attention to the laws or the registry.

NJ Cyber Insurance Helps Businesses Recover More Quickly.

The news about cyber attacks indicates increasing dangers for businesses of all sizes. Now that most companies use remote workers, they are increasingly vulnerable to hackers. Small companies with fewer resources to recover from data breaches, ransomware, and other cyber threats are more at risk of severe loss and recovery without cyber insurance protection.

Because insurance needs vary for each business, at Dickstein Associates Agency, we work with clients to provide them with the right coverage from the best carriers. Our staff is eager to use its expertise to help secure your business insurance needs. We’ll design your Cyber policy to help cover the costs of these services after an insurable cybercrime incident:

  • Forensic investigation to determine the cause of the breach/cyber attack
  • Notification expenses to alert affected customers that their personal information was compromised
  • Credit monitoring services for affected customers
  • Public relations for crisis management
  • Legal services to help you meet state and federal regulations
  • Lawsuits related to customer or employee privacy and security
  • Regulatory fines from state and federal agencies (for example, HIPAA violations for medical offices)

About Dickstein Associates Agency

Dickstein Associates Agency has distinguished itself as a leading provider of personal and business insurance in the tri-state area since 1965. We pride ourselves on being advocates for our clients and providing them with quality and affordable coverages. As Trusted Choice™ independent insurance agency, we partner with various national and regional carriers, allowing for flexible coverage for each client’s unique circumstances. For more information on how you can leverage all your insurance to work best for you, and how we can secure the best insurance in the marketplace suited to your specific needs and business objectives, contact us today at (800) 862-6662 or www.dicksteininsurance.com.

SUBSCRIBE

Be the first to get updates and new offers.

Loading

related post

Locations We Serve

New Jersey, New York, Pennsylvania, Delaware, Florida, Iowa, Illinois, Indiana, Maryland, Michigan and Utah.