<img alt="" src="https://secure.dawn3host.com/210977.png" style="display:none;">
Protecting Yourself & Your Team from Phishing Attacks
Blog Feature
David Whitlow

By: David Whitlow on February 17th, 2025

Print/Save as PDF

Protecting Yourself & Your Team from Phishing Attacks

Training & The Basics

In today's digital age, avoiding online scams has become more crucial than ever. With the growing prevalence of digital platforms for communication, shopping, and banking, cybercriminals continually develop new techniques to exploit unsuspecting users. Falling victim to online scams can lead to financial losses, identity theft, and compromised personal information—consequences that can be both costly and life-disrupting. By staying informed and adopting proactive measures, individuals and organizations can safeguard themselves against these threats and foster a safer online environment. 

 

Here are practical steps to avoid falling victim to similar scams: 

  1. Strengthen Your Security Basics
  • Use Unique, Strong Passwords: Create long, unique passwords for all accounts, particularly your email. 
  • Enable Two-Factor Authentication (2FA): Use a secure method like a physical security key or an authenticator app. Avoid SMS-based 2FA if possible. 
  • Avoid Reusing Passwords: Never reuse passwords across accounts, even with slight variations. 

 

  1. Protect Your Email Account
  • Be Aware of Email’s Central Role: Your email is often the gateway to your other accounts. Prioritize its security. 
  • Disable Cloud Sync for Authenticator Apps: Turn off Google Authenticator’s default cloud sync to avoid exposing 2FA codes. Use offline backups like printed codes stored securely. 

 

  1. Stay Alert to Social Engineering
  • Don’t Trust Calls About Security Issues: The real Google (or any major company) will never call you about account problems. 
  • Verify Information: If you receive a suspicious call or email, hang up and contact the company directly using an official number or website. 
  • Never Approve Unexpected Prompts: If you didn’t initiate account recovery or login, don’t confirm any prompts on your device. 

 

  1. Secure Sensitive Information
  • Never Store Critical Data Online: Avoid storing seed phrases, private keys, or passwords in cloud services like Google Photos, Docs, or Drive. Use encrypted offline storage instead. 
  • Use Hardware Wallets: For cryptocurrency, store seed phrases and keys in secure offline devices like hardware wallets. 

 

  1. Be Vigilant With Communications
  • Inspect Emails Carefully: Look for red flags like urgent language, unfamiliar links, or slight misspellings in sender addresses. 
  • Beware of Links and Attachments: Don’t click on links or download files from unsolicited emails or messages. 
  • Check Phone Numbers: Scammers can spoof official-looking numbers. Always verify by contacting the company directly. 

 

  1. Utilize Advanced Security Features
  • Advanced Protection Programs: Services like Google’s Advanced Protection add robust security features like security keys and block access from third-party apps. 
  • Use Passkeys: Where possible, adopt passkeys as a secure alternative to traditional passwords. 

 

  1. Have a Recovery Plan
  • Secure Backup Codes: Store recovery codes in a physical safe place. 
  • Monitor Account Activity: Regularly review account activity for unauthorized access. 
  • Educate Yourself and Others: Stay informed about evolving phishing techniques and share knowledge with friends and family. 

 

  1. Trust Your Instincts
  • Pause and Reflect: Scammers thrive on urgency and confusion. Take a moment to assess before acting. 
  • When in Doubt, Hang Up: If something feels off, disengage and research the issue independently. 

These steps, combined with ongoing vigilance, can greatly reduce the risk of falling victim to phishing or other scams.

About David Whitlow

David Whitlow, Director of Network Operations at PMMC, has been a vital part of the company since 2009. With over 20 years of experience in the Information Technology field, David ensures the integrity of both locally stored and transmitted data for healthcare organizations across the U.S. He directs employee training programs, adheres to U.S. regulations, and develops controls to facilitate successful SOC II Type II and financial audits.