Why we fall for phishing emails - and how we can protect ourselves - Deepstash

deepstash

Beta

deepstash

Beta

Deepstash brings you key ideas from the most inspiring articles like this one:

Read more efficiently

Save what inspires you

Remember anything

Why we fall for phishing emails - and how we can protect ourselves

https://ideas.ted.com/why-we-fall-for-phishing-emails-and-how-we-can-protect-ourselves/

ideas.ted.com

Why we fall for phishing emails - and how we can protect ourselves
The term "phishing" was first used in 1996 to mean "a scam by which an internet user is duped into revealing personal or confidential information which the scammer can use illicitly." Since then, phishing has exploded in volume and intensity.

6

Key Ideas

Save all ideas

Phishing

It is a scam by which an internet user is deceived into revealing personal or confidential information which can be used illicitly.

At least 3.4 billion phishing emails are sent out worldwide every day.

Phishing scams account for half of all fraud attacks.

41 SAVES

30 READS


VIEW

Losing everything with a click

When it comes to phishing emails, you can lose everything with just a click.

You can give away your most important personal or financial information, download a destructive virus or install malware on your computer that compromises your files.

34 SAVES

26 READS


Using emotional tactics

Phishing emails are designed to bypass logic and manipulate our emotions.

Phishing is effective because it appeals to our biases and emotions. It tries to get us to make a decision quickly without considering possible biases. This leaves us open to unwise decisions.

38 SAVES

27 READS


Exploiting our mental shortcuts

Phishing emails manipulate us via mental shortcuts. There are seven shortcuts or psychological principles of influence that can be exploited by phishers. These include authority, commitment, liking, perceptual contrast, reciprocation, scarcity and social proof.

An example of reciprocity could be getting an emailed coupon and being asked to click on a button to sign up for the retailer's newsletter. 

55 SAVES

32 READS


Reacting to phishing tactics

How people of different ages react to  phishing tactics, according to a study:

  • Nearly half of the participants fell for the phishing emails.

  • Women over age 62 were the most susceptible.
  • Younger adults (18-37) were more susceptible to emails that claimed scarcity.
  • Adults over 62 fell for reciprocity.
  • All users were vulnerable to emails that dealt with legal issues.

34 SAVES

27 READS


Anti-phishing strategies

When you receive an email that asks for important information such as passwords or account numbers, or request payments, offer freebies, especially downloads:

  • Take a moment to verify if the email is coming from a legitimate address or organization.
  • Realize what you could get yourself into if you decide to click on a link.

33 SAVES

23 READS


SIMILAR ARTICLES & IDEAS:

Experiencing Rejection

Experiencing Rejection

For entrepreneurs, the word ‘Yes’ is an exception, not the rule. The small business landscape, where new startups are coming and going, it is common to hear rejection, with investors not interested...

Coping With Rejection

Sticking to your commitment and progress even in the face of rejection is a good way to cope up with rejection, even if one has to blame the other party.

Blaming is not a good option, but it serves the purpose if we absorb the lesson and continue trying.

Don’t Take it Personally

Just remember that failure in one area of life does not reflect your overall self-worth and value.

You have a lot going on. If the other person said ‘no’ to your proposal, or you got rejected in that interview, it is not the end of the world, just an obstacle that is providing you with valuable lessons.

2 more ideas

Social compliance and Social proof

Social compliance refers to how we respond to people in authority or to those who have the appearance of competence and expertise.

Social proof refers to how we look for cues a...

We get fooled regularly

People and businesses often use techniques to get us to do what they want. We go for the “buy two, get one free” offer at the drugstore, or buy the advertised special, even when it is not really needed.

While other people are responsible for the scams, the persuasion mostly happens in our minds. 

Misdirection

The age-old tactic of misdirection is employed to distract us from the real issue. Companies and governments even implement it: they release bad news on Fridays or before major holidays with the hope that the weekend will distract us from focussing on the issue.  

Productive professionals

One research survey, involving 20 000 individuals from six continents, wanted to find out why some people are more productive than others. 

They found professionals with the highest prod...

Productive habits

Highly productive professionals share the same clusters of habits:

  • They plan their work based on their top priorities and then acted with a definite objective
  • They develop effective techniques for managing a high volume of information and tasks
  • They understand the needs of their colleagues, enabling short meetings, responsive communications, and clear directions.

Age and productivity

Age and seniority highly correlate with personal productivity.

Habits of seniors include:

  • Developing routines for low-value activities.
  • Managing message flow
  • Running effective meetings
  • Delegating tasks