Vishing Scams Are On The Increase So You Need To Protect Yourself – Chuck Leaver

Written By David Shefter And Presented By Ziften CEO Chuck Leaver


I was watching television in August, 2015 and I had a call from a 347 location code contact number. I believed that it was a business colleague of mine who lives in the external boroughs, so I answer the call.

The call was a total surprise, “Roy Callahan from the NYC Police Department” threatens me with a warrant for my arrest within minutes, and mentions that I need to turn myself into the regional cops department. So, I spoke with my buddy Josh Linder. He states that it’s rampant in the area where he lives and likewise happened to him, but they threatened him if he didn’t comply by purchasing a $9000 Green Dot prepaid card.

If You Think This Sounds Embellished …

This happens thousands of times every day. Law enforcement agencies (LEA’s) varying from local municipalities to the FBI, and everything between are under immense pressure. They cannot contend – bad actors are fast, smart, and ahead of the curve.

These crooks likewise know how budget, skill and resource constrained the LEA’s are. The local ones are best at catching thieves and pulling over speeding cars, not tracking terrorists to their origin across federal or state boundaries. With little coordination or interest and an absence of tools, over 99% of these scams go unsolved.

How Did They Find Me?

Initially, social networking has actually produced a treasure trove of details. Individuals trust their name, address, phone number, work history, academic background, and social circles to the public domain. This is where the threat lies, not the much promoted hacks at federal government agencies, financial institutions, health care companies and merchants.

However, the big exposures at merchants like Home Depot, Target and Michael’s in addition to the more recent hacks at the United States Office of Personal Management (OPM), United Airlines and Anthem need to be of significant concern. This information permits perpetrators the ability to triangulate data, and build an abundant persona of people like you and me.

Putting this into context, 10s of millions of records were exposed, which could be utilized to go far beyond extortion payments, and move towards the exploit physical susceptibilities in military workers, executives and even normal individuals.

How Quickly Will I Be Exposed?

In accordance with a 2014 FBI scam alert, victims reported having money illegally withdrawn from their accounts within 10 minutes of getting a vishing call, and another of having hundreds or thousands of deceptive withdrawals in the following days.

What Can You Do About It?

As a citizen, it is best to be watchful and use sound judgment. No matter what a “vishing” caller ID says, the United States Internal Revenue Service will not demand cash or account numbers. Don’t succumb to Vishing’s evil cousin Phishing and click on links in e-mails which might take you to a malware website – invest an extra two seconds confirming that the e-mail is actually who it is from, not just a name that is familiar.

Second, it’s best to secure your social profiles online. Facebook, LinkedIn, Twitter, and the horde of other tools have probably currently exposed you. Perform a basic Google search, then move towards clean up the public elements of your Internet persona.

Third, imitate a business to secure your workers as if they were your family. Big organizations have actually invested greatly in anti-viruses, drive encryption, email security, and next generation firewalls. None of this matters – phishing and vishing frauds go right around these. You need training, ongoing education, vigilance, and technology which is smarter. An essential approach to this is executing constant endpoint visibility on your devices. At Ziften, our software plugs security exposures to form a more resilient wall.

The fight for cyber security protection is consuming your resources, from your people to your budget plan. Risks are much faster, more intelligent, and more targeted than before, and working their way around conventional prevention solutions and getting straight to the point; your endpoints. When breached you have less than an hour before the cyber attack finds extra victims within your organization. Time is of the essence, and considering that we can’t create more of that, we concentrate on taking full advantage of constant intelligence so your group can make the best decision, right now.

In Closing

Today, people are so focused on deceitful payment card charges, and organizations are locking down endpoints at a record rate.

More has to be done. The criminals are faster, more intelligent, more enabled – and outside the bounds of the authorities. While news will always arrive concerning the success of catching massive fraudsters and untouchable foreign nationals in China and Russia, there will be thousands of small exploits every day.

At Ziften, we have one objective, to make endpoint security fast and easy for the end user to not just implement, however handle and drive everyday value. By integrating real-time user, device, and habits monitoring with powerful analytics and reporting, Ziften instantly empowers any company to view, check, and respond to the very latest attacks.

My thanks to Josh Linder for his conversations on this topic.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title="" rel=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>