Yesterday we looked at the importance of using strong passwords, but even the strongest password is of little benefit if a cyber criminal can trick you into handing it over to them willingly. This is what phishing emails are designed to do, so in today’s post we’ll explain some of the manipulative techniques they employ and what you can do to defend against them.
If you’d like to have a go at spotting potential phishing messages without putting yourself at risk, try this quiz from Google.
Despite strong passwords being fallible to a successful phish, there are ways to make it more difficult for a cyber criminal to access your account – even if you unwittingly hand over your password. Multi Factor Authentication (MFA) is one such method and we’ll be exploring what it is and how it works when we return tomorrow.