We are ready to assist you, with any urgent updates to your website and other parts of your online business. Please get in touch if you need a hand.



3 dangerous ‘–ing’s, you should be aware of

3 dangerous ‘–ing’s, you should be aware of

Posted in Internet Security by Abilash on September 18, 2015

Dangerous ‘–ing’s

-ing inflects verbs in English grammar but you would never know it could inflect your business too, until you knew about some of these. Here are three ‘–ing’s that are dangerous for your business.

  • Phish-ing
  • Vish-ing
  • Smish-ing

What are these?

These are common and related criminal activities that attempts to fraudulently obtain sensitive information. An online predator uses one of these techniques to obtain confidential information from a victim. The confidential information could be anything from your voicemail pin to your online banking passwords. For a business they are more dangerous because these sensitive or confidential information is handled by more than a single person which makes it easier for the predator.

In short, Phishing is the act of fraudulently obtaining sensitive information by sending emails purporting it to be from reputable companies or individuals in order to induce individuals to reveal the information

Vishing is a similar act but here the predator uses the telephone for this purpose. A simple call could fool the victim into thinking he or she will profit when revealing such information.

Smishing is a type of attack where mobile phone users are tricked to reveal sensitive information through a SMS. Users may receive text containing a link to a malicious website or a Trojan/virus which can transmit sensitive information from the mobile to the predator.

Invoice email scam now targeting Australian businesses

SCAMwatch, a website run by the Australian Competition and Consumer Commission (ACCC) posted information about the invoice email scam. When you read this post you will understand how serious these scams can affect you and your stakeholders. The easiest way a hacker or a predator can hack into your systems or into your stakeholder’s systems is using one of the phishing attacks. This is not only easy but also does not leave any trace of attack logs or brute force logs when the hacker tries to break open. Imagine the situation as if the hacker had the keys to your home when you were away. He doesn’t need to break in, he just opens the door…it’s that easy.

How can you protect your business?

Here are some tips:

  • Secure your IT infrastructure by partnering with the right people who can wholly manage your IT effectively
  • Keep your stakeholders well informed about best security practices from time to time
  • Promote security awareness from within your organization
  • Discuss any suspected emails, calls or suspicious activities with your IT partner
  • Do not be afraid to discuss with your partner even after or during the time you are being victimized as there still may be ways to get back things on track

I’m a Concise Evangelist 🙂

Yes, I love evangelizing individuals and companies to Concise Digital’s programs. At Concise we have a team of experts not only in digital marketing reaping revenues for you, but also security experts who can secure your business and secure your profits.

Connect with us

Would you like to know the best tools and business resources we recommend?

Connect with us on social media as we share links to news, vital updates and other cool stuff to make you money and save you money.

Learn with us

Now you can learn how to stay on top of change in the digital world. We run workshops and webinars to help our clients and our community. Most of these are free.

Join up for webinar invites

Concise Digital Site Map