Attend IT Blog

Attend IT Limited has been serving the Brentford area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Not Even Voicemails are Safe from Phishing

Not Even Voicemails are Safe from Phishing

Phishing attacks have consistently been prominent in cybercrime throughout the past few years, not only due to their efficacy but also because there are so many avenues wherein phishing can be attempted. The first that comes to mind is email, of course, but you and your team need to keep these others in mind.

Take, for instance, a phishing voicemail…dubbed, naturally, a “phoicemail.”

Underhanded tactics like these are critical to understand and be able to identify if you are to protect your business.

How Do Phoicemail Scams Work?

In order to appreciate how these scams function, we need to consider the recent trend of deepfakes—artificially generated footage of someone based on numerous data points—and remember that these scams often also feature audio. So, if a scammer can fool people with a doctored video, it stands to reason that it’s worth trying to fool people with just the audio.

Enter phoicemail scams, where generated audio meant to mimic the supposed caller is left as a voicemail message instructing the recipient to do something they shouldn’t. For instance, sharing confidential or otherwise privileged information.

Picture it: you come back to the office after lunch, only to see that you’ve received a phone call while you were away and there’s been a message left there. You listen to your voicemail, only to hear a voice that sounds a lot like your manager requesting you to send over the credentials needed to access an account to a different email address than usual.

Would you fall for it? While it may be tempting to assume that you’d be able to pick up on how suspicious this seems, it is important to acknowledge that the fact that it isn’t coming in through an email might be enough to throw you. Plus, it isn’t unheard of for IT professionals—the ones who are arguably most conditioned to keep security in mind—to fall for these scams.

Phoicemail Threats Can Be Hard to Spot

Like many modern examples of phishing, it can be a real challenge to accurately judge whether a message has been tampered with or not.

Don’t believe us? Check out the study that MIT is currently running, where you are challenged to identify deepfakes by examining transcripts, audio recordings, and videos of Joseph Biden and Donald Trump—half of which are real, half fabricated. While some of the fraudulent audio clips included are somewhat apparent, it may be more difficult than you’d expect to separate the more convincing samples from the truth.

Phishing Awareness of All Types Needs to Be Part of Your Cybersecurity Posture

It is important that your team is aware that phishing can happen in many ways, not just through their email inboxes. Phone calls and voicemail messages, text messages, even search engine results can be phishing vectors. Your team needs to know this, and keep this lesson in mind whatever they happen to be doing.

Attend IT Limited can help Brentford and West London businesses practice these security-conscious habits, while also implementing more secure technologies and protections to help minimize cyberthreats as much as possible. Find out how we can help you and your business’ team by giving us a call at 020 8626 4485 today.

Tip of the Week: Using a Spreadsheet to Calculate ...
The Wide Scope of Cloud Offerings Gives Businesses...

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Business Computing Network Security Productivity Best Practices Cloud Tip of the Week Data Backup Hackers Managed IT Services Business IT Services Disaster Recovery Data Recovery communications Data IT Support Privacy VoIP Hosted Solutions Software Innovation Backup Mobile Devices Small Business Malware Cybersecurity Efficiency Business Continuity Computer Saving Money Hardware Phishing Internet Outsourced IT Cloud Computing Email Business Management BDR Collaboration Automation Microsoft Productivity User Tips Information Technology Smartphones Internet of Things IT Support Ransomware Upgrade Smartphone Server Workplace Strategy Compliance Managed IT Quick Tips Users Covid-19 Managed IT services Mobile Device Management Mobility Meetings Communication Network Risk Management Budget Workplace Tips Artificial Intelligence Remote Managed Service Provider Save Money BYOD Mobile Device Training Avoiding Downtime Spam Gadgets Windows 7 Android Document Management Remote Workers Human Resources Google Networking Wi-Fi Passwords Project Management Instant Messaging Time Management Wireless Computers MSP Information Virtual Private Network History Windows 10 Employee-Employer Relationship Router Firewall VPN Hosted Solution Printing Remote Work Microsoft Office Content Filtering Remote Computing Cost Management Password Data Management Chrome Managed Service Automobile Paperless Office Manufacturing Personal Information Software as a Service Printers Conferencing Hybrid Cloud Recovery Data Breach Mobile Office Marketing Saving Time Backup and Disaster Recovery Data Security Government Business Technology Printer Employer-Employee Relationship Telephone Systems Maintenance Hacker Redundancy End of Support Tech Term Help Desk Wireless Internet Social Media Mobile Hard Drives Laptop Computing Encryption Solid State Drive Audit Machine Learning Video Conferencing Devices Monitoring Voice over Internet Protocol Managed Services Telephony IT Service Office Big Data Value Upgrades Business Telephone Outsourcing Alexa for Business Outsource IT Business Intelligence Spyware Management e-waste Fiber Optics Social Engineering Administration Antivirus Vendor Management Azure Wireless Technology IoT Students Utility Computing Troubleshooting Bitcoin Microsoft Outlook Smart Tech Vendor File Sharing Smartwatch Computer Repair PDF Dark Web Cybersecurty Education Cleaning App Apple Financial Technology Windows Server 2008 Colocation Holiday SMB Active Directory Workstations Customer Service Break/Fix Window 10 Cabling Money Work/Life Balance Unified Communications Development Finance Connectivity Hacking intranet Remote Working Phone System Black Market Evernote WPA3 Downtime Application SaaS Managed IT Service User Error Employees Inventory Management Transportation Entertainment Current Events Samsung Vulnerability Regulation Wasting Money Windows Server Copier Streaming Media Online Storage PCI DSS Office 365 Flexibility Remote Monitoring Infrastructure Files Disaster OneNote Word Private Cloud iPhone Save Time Smart Technology Data Protection Nanotechnology File Storage E-Commerce Hiring/Firing Proactive IT Battery Two-factor Authentication Data Loss Copiers Employer/Employee Relationships Going Green Windows 10 HIPAA Cybercrime Amazon Mobile Computing Applications Content Filter Customer Relationship Management Regulations Compliance Facebook Payroll Videoconferencing Operating System Electronic Medical Records Blockchain Gamification Leadership Virtualization Professional Services Workers Bandwidth Payment Cards RMM Telephone Voiceover Internet Protocol Cost Advertising Company Culture The Internet of Things Analysis Virtual Assistant Going Paperless Update Proactive AI Streaming Legal Commerce Lifestyle Browser Shadow IT Travel Chromebook Windows 11 Social Cast Microsoft Excel Computer Forensics Hyperlink PC Robot Politics Charger Computer Fan Adobe Wireless Charging App store Authentication Managing Stress Emergency Business Strategy Policy Print Management Humor Hard Disk Drive Shortcut Websites Computer Tips Facebook Privacy Solutions Supply Chain Search Worker Commute Scam Legislation USB Books Tablets Microsoft Word Consultant Gmail Wasting Time Innovations Remote Management Experience Best Practice WannaCry Mobile Security Internet Service Provider Windows 8.1 Tech Support YouTube Procedure Healthcare How To Excel Gifts Data Theft Miscellaneous Emails IT Solutions Comparison Language Keyboard Shortcuts CRM Virtual Reality Television CrashOverride NFL Relocation HBO Storage PowerPoint Accessory Server Maintenance Inventory Telephone System Apps Computer Care Licensing Identity Myths Voice Law Enforcement Worker Fraud Display Holidays Organization eWaste Testing 5G Environment Webinar WIndows Server 2008 Specifications Keyboard Video Games Touchscreen Sports IT budget Peripheral Investment Communitications Reviews Print Text Messaging Music Unsupported Software Data Privacy Threats Workstation Reputation WiFi Data Storage Edge Google Assistant Co-Managed Services OneDrive iOS Sync Credit Cards Security Cameras Processor Net Neutrality Work Windows Ink Device Security Camera Medical IT Workplace Strategies Scalability Computer Accessories IT solutions Patch Management Sales Virus Financial Micrsosoft 2FA Google Drive Health IT Management Cortana Access Control ROI Hosted Desktop Database Office Tips Analytics Root Cause Analysis Hard Drive Scams Telework Point of Sale Unified Threat Management Screen Mirroring Google Docs Ciminal Twitter Sabotage SSD FAQ Benchmarks Alert Safety Settings Google Maps Projects eCommerce Internet Exlporer Windows 10s Outlook Retail Bring Your Own Device Digital Signage Virtual Desktop HaaS Windows Identity Theft Identities Memory Admin Windows Server 2008 R2 Smart Devices Biometrics How To Augmented Reality Updates Employee Managed Services Provider Audits