How To Avoid Getting Hacked

How To Avoid Getting Hacked

How To Avoid Getting Hacked 1200 1200 Conversion Marketing

Tips and Advice to Avoid Common Scams in 2023

Over 3.4 million scam phishing emails are sent every day and in a world where they are becoming increasingly complex and sophisticated, it is getting harder and harder to protect your accounts. Depending on the structure of the scam and the account that was hacked it can be a long, frustrating, and sometimes fruitless process to get access to these accounts again, making prevention a critical component of cybersecurity for businesses of any size.

To help, we’ve gone ahead and noted down some of our top tips that you can implement today to protect yourself and your business.

Be Alert

It sounds self-explanatory but the number one way you can protect your accounts from hackers is by not engaging with them in the first place. Understanding that scam emails can replicate and look like platform alerts, messages from friends, or even emails from your boss will go a long way to helping you stay alert to online/phishing attacks.

If in doubt about an email don’t click on any links, open any attachments or give over any information until it can be confirmed. You can also search for information about the suspected scam online to see if others have received similar emails/calls.

Verify & Confirm

As mentioned above, one of the most common scams we see involves people receiving “support” messages/platform alerts or messages from friends, colleagues, managers etc. Once you’re aware of the fact that these can happen, knowing how to verify and confirm the information can help you protect yourself and your accounts. We’ve included examples of common scams below.

Platform/Tech Support Alerts

One of the most common scams we see are emails designed to look like platform alerts. This might be an alert from Meta telling you that your account has been flagged for violating a policy, requests to update your information or a myriad of other things from many different platforms. These emails then ask you to follow a link to resolve the issue, where you are then asked to enter your login details into a platform that looks exactly like you would expect it to (they even spoof the URL). Once this is done they will use that login information to gain access to your real account and kick you out.

Meta Screenshot

To avoid this kind of scam you can follow the steps below:

  • Pause for a moment to take a look at the email address and for any other clues that might immediately give away that this is not a real platform email.
  • Log in to the platform in question directly (not via the link in the email) and look for an alert that mirrors what you are seeing in the email. Most platforms will show a pop-up or banner for anything that is important for you to know.
  • If you aren’t able to see anything but are still wary then we strongly suggest screenshotting the message and having someone you trust or your digital agency give their opinion.
  • Remember the messages are designed to make you panic, but it is always better to take time to do your due diligence than open yourself up to a potential scam.

Messages From Friends

Another extremely common phishing scam involves hackers gaining access to one social media account and then using that account to gain access to others by pretending to be the original user. This will usually come in the form of a message from someone asking you to help them in some way. One of the most common ones we see is a friend letting you know they will send a code to your number for you to give back to them. The hacker then sends you your own 2-factor code to gain access.

Meta screenshot of messages from "friends"

To avoid this kind of hack you can follow the steps below:

  • Consider whether this makes sense – would this person reach out to you this way? Does it sound like them? These can be the first indications that something is wrong.
  • Verify their request through a different platform. Ideally, we recommend giving your friend a quick call and checking if it really is them, but contacting them through any platform other than the one you are on will do the job.
  • Until you are able to verify the request with your friend do not click on any links or reply to the message. Better safe than sorry!

Email Spoofing

Email spoofing scams work by using a technique to make the email appear as if it is coming from a legitimate source. This could be your boss, a coworker, a client or anyone else the scammer knows you are likely to trust. These emails will usually ask you to click on a link or open a file for any number of reasons.

Email Spoofing

This kind of hack can be tricky to avoid particularly in a work environment because we can sometimes go into autopilot when sorting through our inbox. To avoid this you can follow the steps below:

  • The most impactful thing you can do is to consider whether this email is something you would expect to receive. If it seems out of place or you weren’t aware it was something they wanted done then take a second to verify the request.
  • Verify, verify, verify. Ask your colleagues if they received the same thing and check with the sender to confirm their request.
  • Be cautious of texts as well – while email phishing scams are by far the most common it is also possible for hackers to spoof phone numbers, so be sure to apply the approach above to texts and phone calls as well!

Two-Factor Authentication

We know, we know, this is the advice that every single platform, blog and man on the street is giving you BUT it is definitely one of the most critical steps to protecting your accounts. With that being said 2-factor can produce its own problems if you lose access and lock yourself out of your account, so when adding 2-factor, here are a few extra steps you can take to make sure you don’t lock yourself out:

Multiple Methods:

When possible try to use various methods of 2-factor so that you have options should something happen. Options usually include:

  • Email
  • Authenticator App (if you don’t know what this is – ask one of our team to help you set it up)
  • Mobile Phone

Using a variety of methods means that if one goes down, e.g. if you lose access to your email then you will still be able to access your account by other means.

Backup Codes

Most platforms give you the option to add backup codes. These are a set of codes that can be printed out and used should you lose access to all other means of 2-factor authentication. Print these codes out, or write them down and then store them somewhere safe. This effectively gives you a master code to access your account should you get locked out. Facebook’s guide to adding backup codes can be found here. Google’s guide for adding backup codes can be found here.

We know that it can feel overwhelming sometimes to take on hackers and protect ourselves and our businesses, but by implementing the practices above into our digital lives we can stop them in their tracks. Remember that practice makes perfect and if you keep these tips top of mind they will soon become second nature.

If you’re uncertain about where to start, want clarification on any of the recommendations in this guide, or you’re ready to chat about your digital presence please reach out to our team, we’re here to help.