Aug 28, 2021
There are several common and, unfortunately, frequently successful avenues of attack that cybercriminals
can use to part you from your personal contact and financial information. These phishing attack methods
include email, phone calls, corrupted software or apps, social media, advertisements, and even direct SMS
(text) messages.
Beyond the medium used to reach you (which is most often email—still!), what are some of the signs
and behaviors to look for? Not every threat is as obvious as you’d hope, and conversations that focus on
the inbox only are completely inadequate in the harrowing landscape we now find ourselves in.