About Us | Contact Us
View Cart

Don’t Get Smished!

By Vigilize | Thursday, July 5, 2012 - Leave a Comment
Gone Smishing

Mobile Devices Security Awareness (and User Awareness) can prevent successful smishing attacks!

We have all heard about phishing, or at least I hope so. But, how many have heard about smishing? Smishing is another form of social engineering attack that uses SMS (text messaging) and mobile devices instead of the telephone (voice) to glean nonpublic information from unsuspecting individuals.

“Smishing:” A New Threat To Mobile Phone Users

A smishing message usually contains something that looks like it came from a financial institution or a message stating that the person will be charged a certain fee if action is not taken immediately. The individual is then required to click on a link or call a phone number that is conveniently provided to in the message. From there, the victim is required to provide certain information (e.g. account numbers, login credentials, Social Security number, etc.).

Here are some guidelines to protect against smishing:

  • Smishing is another form of social engineering – using text messages to get your private and confidential information!
  • Always follow company policy regarding securing your mobile device. *
  • Don’t reply to unsolicited text messages.
  • Don’t “click” on links or open attachments that you are not expecting.
  • Verify the authentication of a text message or its sender.
  • Don’t enter sensitive information in a text message – keep your information private.
  • Don’t call phone numbers as directed in text message. That’s a way for smishing to turn into phishing!
  • When in doubt, don’t! Call your Information Security Officer or Network Administrator.

To help you remind your employees about smishing and ways to protect themselves, here’s a security awareness reminder poster that you may print and either hand out to your employees or post it in conspicuous locations:    Gone Smishing


*For policies about mobile security, visit BYOD – Mobile Devices Security – Bring Your Own Device Policy.

Latest News
    Welcome Cybersecurity Conference Attendees! Thanks for joining us for the Cybersecurity Conference today! We have created this page for you to have access to the deliverables from Dan’s talk.  
    What you need to know for compliance coast-to-coast. Back in 2020 we posted an article containing links to data breach laws from each state, and it has proven to be one of our more popular posts.  Because laws surrounding the use (and abuse) of technology are always evolving, we thought it was worth taking another […]
    Why It Rhymes With SEEM (And its Not the I Before E Rule) Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . It’s the Gestalt. The idea that the whole is greater than the sum of it’s parts. That’s not something that is often brought […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Questions about China’s new disclosure laws only highlight the uncertainty about disclosure in general… An article review. China recently made waves in the security world by announcing a new set of data security laws, one of which has added new fuel to a long running debate: how and when should security vulnerabilities be disclosed…and to […]
    Four Conditions … …For Why a Network Can be Anything But a Network! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . I have to admit that infotex is being called into engineering meetings with larger organizations these days that are NOT community based banks.  We […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    If Zero days need Zero clicks, are there any secure devices in the mix? Tanvee Dhir explores the Pegasus spyware. Another technical post, meant to inspire thought about IT Governance . . . . Introduction Over the past couple of weeks, we have seen multiple stories regarding a powerful piece of spyware called Pegasus sold […]
    Our Lead Non-Technical Auditor takes a look at the new AIO Guidance… Architecture, Infrastructure, and Operations (AIO) is the latest booklet released by the Federal Financial Institutions Examination Council (FFIEC) in their line of  IT Examination Handbooks. It is an update to their 2004 Operations booklet and, as the name implies, expands into the areas […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]