fbpx

Did you see the video that made the rounds on the internet last month in which a hacker stunned a journalist by gaining access to his cell phone account just by playing the sounds of a baby crying in the background? Hacking doesn’t have to be sophisticated as long as people are the weakest link in their own security.

Hackers use a lot of different techniques to gain access to your personal information. They can start with your social media accounts and gain access to personal details of your life. They can then use those details to pretend to be your banker and convince you to hand over even more of your personal information until they have exactly what they want.

Learn more about popular vishing, smishing, and spear phishing techniques from this infographic. If you know what phishing looks like you will be more likely to stop it in its tracks!

Vishing-Smishing-Attack


NowSourcing

Brian Wallace is the Founder and President of NowSourcing, an industry leading infographic design agency , based in Louisville, KY and Cincinnati, OH which works with companies that range from startups to Fortune 500s. Brian also runs #LinkedInLocal events nationwide, hosts the Next Action Podcast, and has been named a Google Small Business Advisor for 2016-2018. Follow Brian Wallace on LinkedIn as well as Twitter.

View all posts

Add comment

Leave a Reply!

This site uses Akismet to reduce spam. Learn how your comment data is processed.

NowSourcing

Brian Wallace is the Founder and President of NowSourcing, an industry leading infographic design agency , based in Louisville, KY and Cincinnati, OH which works with companies that range from startups to Fortune 500s. Brian also runs #LinkedInLocal events nationwide, hosts the Next Action Podcast, and has been named a Google Small Business Advisor for 2016-2018. Follow Brian Wallace on LinkedIn as well as Twitter.

Get The Newsletter

Enter your email address to subscribe to ITN and receive notifications of new posts by email.

Book Recommendations

Categories