SPAM vs. PHISHING in 2013
This is my fourth blog on computes security. In this one you will learn more about SPAM vs. PHISHING in 2013.
Both SPAM vs. PHISHING are easy way to infect your computers/laptop/cell phones.
Malware, short for malicious software, is used by attackers to disrupt computers, gather information, or gain access to private computer systems. Many of these attacks come through a combination of deceitful e-mails and compromised Web pages. Two types of e-mails are often used: SPAM and PHISHING. It’s important that you know how to deal with each of them. The differences between the two are highlighted in the table below:
SPAM | PHISHING | |
---|---|---|
What is it? |
|
|
What does it look like? |
|
|
What not to do |
|
|
What to do |
|
|
Best practices for both |
|
How to protect
Smart online usage means taking steps to avoid falling victim to online fraud. Online fraud occurs when criminals try to obtain your personal information, such as credit card and account numbers, get you to pay for items that are either non-existent or misrepresented to you and/or steal your identity.
Secure firewalls help prevent unauthorized access to your internal systems.
Constant monitoring maintains the quality of our systems, proactively identifies unusual customer account activity and helps provide you with around-the-clock peace of mind.
128-bit encryption, the highest level of encryption generally available, helps assure that your data can only be decoded and read by our secure online environment.
Email safety. Don’t reply to authentic-looking emails that attempt to get you to release personal and financial information. Email is not secure. TD Bank Group will ask you to call us at a verifiable telephone number for such a discussion.
Passwords & login pages. Guard your usernames, passwords and login information – they’re the keys that let you in to your accounts