Reacting to phishing tactics - Deepstash

Bite‑sized knowledge

to upgrade

your career

Ideas from books, articles & podcasts.

Reacting to phishing tactics

How people of different ages react to  phishing tactics, according to a study:

  • Nearly half of the participants fell for the phishing emails.

  • Women over age 62 were the most susceptible.
  • Younger adults (18-37) were more susceptible to emails that claimed scarcity.
  • Adults over 62 fell for reciprocity.
  • All users were vulnerable to emails that dealt with legal issues.

1

STASHED IN:

47

MORE IDEAS FROM THE SAME ARTICLE

Phishing emails manipulate us via mental shortcuts. There are seven shortcuts or psychological principles of influence that can be exploited by phishers. These include authority, commitment, liking, perceptual contrast, reciprocation, scarcity and social proof.

An example o...

Phishing emails are designed to bypass logic and manipulate our emotions.

Phishing is effective because it appeals to our biases and emotions. It tries to get us to make a decision quickly without considering possible biases. This leaves us open to unwise decisions.

When you receive an email that asks for important information such as passwords or account numbers, or request payments, offer freebies, especially downloads:

  • Take a moment to verify if the email is coming from a legitimate address or organization.
  • Realize what you co...

It is a scam by which an internet user is deceived into revealing personal or confidential information which can be used illicitly.

At least 3.4 billion phishing emails are sent out worldwide every day.

Phishing scams account for half of all fraud attacks.

When it comes to phishing emails, you can lose everything with just a click.

You can give away your most important personal or financial information, download a destructive virus or install malware on your computer that compromises your files.

Discover and save more ideas by creating a

FREE

Deepstash account.

Develop a

reading habit

, save

time

and create an amazing

knowledge library

.

GET THE APP:

MORE LIKE THIS

Business fraud is a major threat

A 2020 fraud survey estimated that the total cost of company fraud in the US to be about $7 billion in a year.

Many fraudsters use the internet as their primary mode of trade. Therefore, business owners should invest in better cybersecurity systems and programs to protect t...

STASHED IN:

2

Cyber attacks

Due to the pandemic, home and professional lives have merged. Employees are taking their work computers to home networks, potentially opening the door for hackers.

Mobile devices are less protected than computers, and spy apps make it easy for hackers to intrude into these devices. This is ...

STASHED IN:

5

Internet Addiction Disorder

Unlike chemical addictions that may come to mind more easily, Internet Addiction Disorder (IAD) is not caused by a substance. It is part of behavioural addictions, along with gambling disorder, gaming disorder, and more. That doesn’t make it less serious, and it can still dramatically affect some...

3

STASHED IN:

11