Securing the Tech: Identifying Phishing attempts
In modern computer systems the weakest point (from a security perspective) is often times the person sitting at the desk. Tricking the person into opening up their computer can yield the best outcomes for hackers. Remember it is best security practice not to accept something that is offered to you but instead to go through proper channels to get what you may need. Someone coming to you with an offer of help, especially one you may not have known you needed, is much more likely to have nefarious purposes than if you sought them out yourself. Think about in the real world. If someone is too eager to offer help you start to wonder what their angle is. Why are they so keen to offer help? Often it is best to ask for help from a stranger than to accept help from someone who is approaching you offering. The odds that you will meet a nefarious character go way up when they are the one choosing to have an interaction with you. The same concept can apply to computer security. When a window pops