Have a Question?
-
General Security FAQs
- How do I stop phone scams?
- What does cyber security training involve?
- Why do businesses need cyber security training?
- Do I need antivirus on my mobile phone?
- Where Can I Get Free Cyber Security Advice?
- Are security assessments needed within education settings?
- Do I need to worry about security of cloud-based systems we use?
- We’re a small company do we need to worry about cyber security?
- I have anti-virus software do I need more than this?
-
Our Services
-
Securing your business
- What does cyber security training involve?
- Why do businesses need cyber security training?
- How do I secure Amazon Web Services?
- How can we secure Google Workspace (G-Suite)?
- What is the Best Antivirus Software?
- Who Should Be Responsible for Security in a Business?
- What is Microsoft SecureScore?
- What Does a Virtual CISO Do?
- How Secure Are Chromebooks?
- Can I Use the Same Password Everywhere?
- What is a Vulnerability Assessment?
- What is Disaster Recovery?
- How Long Should My Password Be?
- What is a Password Manager?
- How Often Should I Change My Password?
- What is a Business Continuity Plan?
- Show all articles ( 1 ) Collapse Articles
-
Standards & Frameworks
- Does ISO 27001 Cover GDPR?
- What is HIPAA?
- What is PCI DSS?
- How is Cyber Essentials Assessed?
- What are the ISO 27001 Controls?
- How Long Are Cyber Essentials Certificates Valid For?
- Does Cyber Essentials Cover GDPR?
- What is Cyber Essentials?
- What is the Difference Between Cyber Essentials and Cyber Essentials PLUS?
- What are the benefits of ISO 27001?
- What is ISO 27001?
-
Laws & Regulations
-
Cyber Security Glossary
- What is Tailgaiting?
- What is PreTexting?
- What is Scareware?
- What is Baiting?
- What is Penetration Testing?
- What is Ethical Hacking?
- What is XSS?
- What is WAF?
- What is VPN?
- What is TVM?
- What is SSO?
- What is SQLI?
- What is SOAR?
- What is SIEM?
- What is RBAC?
- What is RAT?
- What is PCI-DSS?
- What is OSINT?
- What is NIST?
- What is NCSC?
- What is MFA?
- What is MAC?
- What is ISO?
- What is IPS?
- What is IOT?
- What is IOC?
- What is IDS?
- What is HTTPS?
- What is HIPAA?
- What is GDPR?
- What is EDR?
- What is DLP?
- What is DDoS?
- What is DOS?
- What is DAC?
- What is CVSS?
- What is CND?
- What is CISSP?
- What is CISO?
- What is the CIA Triad?
- What is AV?
- What is AC?
- What is APT?
- What is 2FA?
- What is a Virtual CISO or vCISO?
- What is Blue Teaming?
- What is Purple Teaming?
- What is a Zero-Day Vulnerability?
- What is a Zero-Day Attack?
- What is XSS (Cross-Site Scripting)?
- What is a Worm?
- What is White Teaming?
- What is Whaling?
- What is a Watering Hole Attack?
- What is Vulnerability?
- What is a VPN (Virtual Private Network)?
- What is a Virus?
- What is URL Injection?
- What is a Trojan?
- What is a Threat Actor?
- What is Steganography?
- What is SQL Injection?
- What is Spyware?
- What is Website Spoofing?
- What is Spear-Phishing?
- What is Spam?
- What is Social Engineering?
- What is Smishing?
- What is Single Sign-On (SSO)?
- What is Sextortion?
- What is a Sandbox?
- What is Salting?
- What is an RPO (Recovery Point Objective)?
- What is a Rootkit?
- What is a Remote Access Trojan (RAT)?
- What is Red Teaming?
- What is Ransomware?
- What is PII (Personally Identifiable Information)?
- What is a firewall?
- What is "cyber security"?
- Show all articles ( 65 ) Collapse Articles
-
Cyber Threats
What is Smishing?
4.2 out of 5 stars
3 ratings
| 5 Stars | 67% | |
| 4 Stars | 0% | |
| 3 Stars | 0% | |
| 2 Stars | 33% | |
| 1 Stars | 0% |
Smishing is a cyber-attack which involves sending the victim a misleading text message to deceive them. The message will often arrive from a seemingly trusted source, usually with a fraudulent link for you to click with the purpose primarily to convince you to take action which would allow the attacker to gain access to your mobile device or gain exploitable information, such as login credentials or personally identifiable information.
Smishing is becoming increasingly popular amongst cyber criminals as people tend to be more inclined to trust a text message than an email (see phishing for details on similar cyber-attacks involving emails). In recent years there have been an increasing number of attacks taking advantage of the changes in consumer behaviour and also targeting those that are more trusting and vulnerable. Cyber criminals are tapping in to the consumer need for fast access to information around online order deliveries, courier updates, competition entries via SMS and an increase in healthcare providers using SMS to keep us up to date with appointments and services since the Covid-19 pandemic began and required a new way of communicating with patients.
If you need support in protecting your staff and organisation from smishing attacks get in touch with us today.
4.2 out of 5 stars
3 ratings
| 5 Stars | 67% | |
| 4 Stars | 0% | |
| 3 Stars | 0% | |
| 2 Stars | 33% | |
| 1 Stars | 0% |