{"id":16961,"date":"2020-12-28T08:58:03","date_gmt":"2020-12-28T13:58:03","guid":{"rendered":"https:\/\/www.knownhost.com\/blog\/?p=16961"},"modified":"2021-03-29T08:44:04","modified_gmt":"2021-03-29T12:44:04","slug":"how-to-avoid-phishing-scams","status":"publish","type":"post","link":"https:\/\/www.knownhost.com\/blog\/how-to-avoid-phishing-scams\/","title":{"rendered":"How to Avoid Phishing Scams"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><strong>Updated December 28, 2020<\/strong><\/h3>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is Phishing?<\/strong><\/h2>\n\n\n<p>Staying safe online is no easy task, even more so with the advent of automated phishing scams which are most frequently created so that people give away sensitive information such as website logins or banking details.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Phishing scams often make use of electronic communication, such as social media posts, emails, text messages or instant messaging and are sent by accounts\/people who are either known to the recipient or appear to be from someone they know and trust.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>It is the implicit trust factor that makes phishing scams so successful.  We&#8217;re conditioned to click links or open messages from those we trust &#8211; it&#8217;s the foundation of modern electronic communication.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Unfortunately, once a link is clicked and details entered, scammers now have access to that personal information and can use it for nefarious purposes.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Big is the Phishing Scam Problem?<\/strong><\/h2>\n\n\n<p>With nearly 300 billion emails being sent every day, it&#8217;s all too easy to assume that email is a safe way to communicate &#8211; and it generally is safe, but not always.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Symantec has estimated that .05% of emails are part of phishing attacks.  It doesn&#8217;t sound like much, but works out to around 150 million phishing scam emails being sent daily.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Over time, computer users are getting better at avoiding obvious scams, so scammers are getting more sophisticated in their approach.  In fact, phishing attacks are increasing in number each year at a double-digit rate.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Of the 150 million email phishing scam attempts sent each day, roughly 10% get past defensive software and land in the inbox.  Of those, approximately half get opened by their intended recipients.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Types of Phishing Scams<\/strong><\/h2>\n\n\n<p>Phishing is a large area, with multiple attack vectors and different types within each.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Whether you refer to the various approaches as categories, channels, vectors, modes or methods, the point remains &#8211; attacks come at us from multiple directions, often simultaneously.  Phishing approaches include:<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Email-based Attacks (Email Phishing)<\/strong><\/h3>\n\n\n<p>Probably the one that we&#8217;re the most familiar with, email-based phishing scams are traditionally thought of as the mass-blast approach where the perpetrator sends out thousands, or even millions, of emails, in hopes that a percentage of them will get through, then opened and ultimately clicked.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Corporate firewalls and antivirus programs are getting more adept at stopping dangerous emails from arriving in user inboxes, but personal computer (non-corporate) users are not as well fortified.  With each iteration of improved detection comes an iteration of increased sophistication of attacker methods, staying one step ahead.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Search Engine-based Attacks (SEO Phishing)<\/strong><\/h3>\n\n\n<p>Search engine-based phishing scams (SEO phishing) have been recognized by major search providers like Google (and Bing) and have diminished in volume as compared to several years ago.  It used to be that a significant percentage of search results were dangerous, that people wouldn&#8217;t recognize them as such and would visit them with disastrous results.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>In more recent years, Google and Bing have started to remove dangerous sites from the search results as well as labeling them as potentially hazardous, thus preventing searchers from visiting.  That said, there are still many dangerous sites in the SERPs.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>SMS-based Attacks (SMishing)<\/strong><\/h3>\n\n\n<p>Much less common, much more effective, and often much more dangerous, SMS phishing scams occur when someone sends an SMS message that appears to be an order confirmation, delivery confirmation, notification of system access, prompt to update security details or otherwise prove that they are indeed the right recipient.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>It&#8217;s all too easy to send an SMS that appears to be from a legitimate source, making links in SMS messages particularly dangerous!<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Social Media-based Attacks (Social Phishing)<\/strong><\/h3>\n\n\n<p>As people spend substantial amounts of time on social media sites, attackers have leveraged this avenue of scamming by compromising their targets via social media networks and messenger clients.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Don&#8217;t think that social media phishing scams are simple, or limited, in nature.  As the public gets more familiar with common scams like the Nigerian 419 banking scams, the attackers come up with new angles, ranging from appearing to finding compromising information about a person that they need to attend to, to looking like they&#8217;ve got details about a cheating spouse.  The list is nearly endless.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Voice-based Attacks (Vishing)<\/strong><\/h3>\n\n\n<p>Voice phishing, or vishing, isn&#8217;t just placing calls to people in order to social engineer them to do something, or give certain information, though these are quite common.  Voice phishing can be tied to SMishing to get people to call certain numbers, often with huge toll charges involved, without the caller realizing how expensive it will be to place the call.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Social engineering can be as simple as getting a receptionist to give over the schedule of a company executive, allow access to a secure area of a building or even as much as providing login details which can be used to remotely access the company network.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Types of Attacks:<\/strong><\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Fake Authority Accounts (aka Impersonation)<\/strong><\/h3>\n\n\n<p>Sometimes appearing as celebrities, politicians, brand representatives or company executives, impersonation scams involve pretending to be some authority figure and using them to spread messaging that&#8217;s untrue, damaging to the brand or otherwise inciting the reader to take action that&#8217;s expensive or dangerous.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Malware Installation<\/strong><\/h3>\n\n\n<p>Malware, once installed on user computers, can be used to log keystrokes (like usernames and passwords), perform events like clicking on paid advertisements or even running cryptominers (like bitcoin mining).  Malware most commonly is used to generate revenue for the scammers by having your computer perform automated activities, though occasionally is used to glean personal information for other purposes.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Personal Detail Theft<\/strong><\/h3>\n\n\n<p>There are times when phishing scammers are wanting your login details or other personal information, like birthdate, mother&#8217;s maiden name, address and telephone number.  Detail theft can include bank account details and website login credentials so that they can impersonate you, order products and empty your accounts through transfers.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>URL Shorteners<\/strong><\/h3>\n\n\n<p>Links can sometimes look like they point to one site, but in fact point to another.  This happens 100% of the time when using URL shorteners, a common occurrence on social media sites, messengers and in SMS messages.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to Protect Yourself Against Phishing<\/strong><\/h2>\n\n\n<p>Avoiding phishing scams takes work.  It means being aware, careful and taking extra steps.  It means removing some of the convenience of instantly responding, instantly clicking or instantly answering questions and requests that come your way.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Call Them Back<\/strong><\/h3>\n\n\n<p>If you&#8217;re not 100%, absolutely, positively certain as to the identity of the person on the other end of the phone, when they&#8217;ve called you\u2026.  Make note of their company, department and name then go online, find the number for them and call them back.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>This includes companies like banks, government agencies, retailers and corporate offices.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>If someone asks you for information to identify yourself, remember that they can use that information in pretending to be you as they login to other websites.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Don&#8217;t give out your date of birth, account details or other personally identifying information until you have called the right number.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>DO NOT ask for their number and call that number to see if it&#8217;s them.  Look up the number online and call the known good number directly.  Ignore any number they tell you to call.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Antivirus and Firewall &#8211; Installed and Updated<\/strong><\/h3>\n\n\n<p>There&#8217;s no excuse for having a computer that doesn&#8217;t run an antivirus \/ firewall combination.  With tons of choices in the market, pick one of the more popular ones, check their reviews and install it.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Keep it updated.  An antivirus application that has out of date signatures is as dangerous as eating mystery meat from the fridge that&#8217;s gone out of date weeks ago.  Keep it updated.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Operating System &#8211; Updates<\/strong><\/h3>\n\n\n<p>Windows, MacOS, Linux or other\u2026.  Operating systems need to be kept up to date, because compromises can occur as a result of out of date system files.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Don&#8217;t Open Links Without Checking<\/strong><\/h3>\n\n\n<p>Links are the crux of the issue with most phishing scams. If you never open a link sent by someone, you&#8217;d avoid 95% of phishing attacks. However, this means you&#8217;d also miss out on a lot your friends, neighbors and family have to share.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Instead of ignoring all links, check them first.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>If you&#8217;ve got a security suite installed, check to see if it has a link checker as one of its functions.  If not, then copy and paste any links into a link checker before actually clicking and following the link.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>One easy to use free tool is available from Google via the Safe Browsing tool:<br><a href=\"https:\/\/transparencyreport.google.com\/safe-browsing\/search\">transparencyreport.google.com\/safe-browsing\/search<\/a><\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Another similar tool is Safe Web from Norton:<br><a href=\"https:\/\/safeweb.norton.com\/\">safeweb.norton.com\/<\/a><\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>A perennial favorite is from long-standing antivirus provider VirusTotal:<br><a href=\"https:\/\/www.virustotal.com\/gui\/\">www.virustotal.com\/gui\/<\/a><\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Don&#8217;t Open Email Attachments Unless First Requested by You<\/strong><\/h3>\n\n\n<p>If you didn&#8217;t ask for someone to send you an attachment, don&#8217;t open the attachment directly.  Instead, save the attachment (without opening it) and then submit the file to VirusTotal above, where there&#8217;s an option to upload and check attachments.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Sometimes just viewing an attachment is enough to trigger the payload and cause your system to become compromised.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Protect Your Personal Information<\/strong><\/h3>\n\n\n<p>Remember that personal information can be the obvious stuff, like account numbers, logins and passwords.  Personal information can also be the information that&#8217;s used to recover lost passwords and do resets &#8211; like secondary validation such as mother&#8217;s maiden name and date of birth.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Do not provide personal information to someone who calls you.  As above &#8211; call them back first at a number found on the official website of the company.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Your secondary validation details are just as dangerous as your primary ones.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Don&#8217;t Re-Use or Multi-Use Passwords<\/strong><\/h3>\n\n\n<p>If you&#8217;re using a password across multiple sites, it&#8217;s time to wake up and smell the coffee.  You can easily get one site compromised and suddenly a scammer can use your logins across multiple sites.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>This becomes particularly nasty when you don&#8217;t worry much about protecting details on a non-secure site that has nothing of value (no purchases, no banking, no financial matters), but you use the same login credentials there as you do across other more secure sites.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Using the same passwords across multiple sites is seriously dangerous!<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Be Alert for Urgent Messages<\/strong><\/h3>\n\n\n<p>When you&#8217;re getting messages about a pending transaction, overdue charge, item about to ship or anything which purports to be about money you don&#8217;t remember spending, for purchases you know you&#8217;ve never made or other financial matters that don&#8217;t sound right, think, take a deep breath and think some more.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Look up the company official phone number online and call them to discuss.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Do not open the link.  Do not answer the phone and treat them as official representatives.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Look up the company official phone number online and call them to discuss.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n<p>Phishing scams are rampant, costly and difficult to defend against without effort.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p><strong>Take the time to protect yourself.  Take the time to investigate.  Take the time to think about the possibility that someone is scamming you.<\/strong><\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Lucky for you, <a href=\"https:\/\/www.knownhost.com\">KnownHost<\/a> offers security optimizations as well as custom DDoS protection, top-notch security is preconfigured to your installation BEFORE ever logging into your account for the first time! Start taking the right security precautions and migrate to <a href=\"https:\/\/www.knownhost.com\">KnownHost<\/a> today!<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Updated December 28, 2020 What is Phishing? Staying safe online is no easy task, even more so with the advent of automated phishing scams which are most frequently created so that people give away sensitive information such as website logins or banking details. Phishing scams often make use of electronic communication, such as social media [&hellip;]<\/p>\n","protected":false},"author":182,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1424],"tags":[2420,2421,107],"class_list":["post-16961","post","type-post","status-publish","format-standard","hentry","category-security","tag-phishing","tag-scam","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Avoid Phishing Scams - KnownHost<\/title>\n<meta name=\"description\" content=\"Phishing scams are created so that people give away sensitive info such as website logins or banking details. Here&#039;s how to avoid scams:\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.knownhost.com\/blog\/how-to-avoid-phishing-scams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Avoid Phishing Scams - KnownHost\" \/>\n<meta property=\"og:description\" content=\"Phishing scams are created so that people give away sensitive info such as website logins or banking details. Here&#039;s how to avoid scams:\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.knownhost.com\/blog\/how-to-avoid-phishing-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"KnownHost\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/KnownHost\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-28T13:58:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-29T12:44:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2020\/12\/phishing-scam.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Emily Moore\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:site\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emily Moore\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/how-to-avoid-phishing-scams\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/how-to-avoid-phishing-scams\\\/\"},\"author\":{\"name\":\"Emily Moore\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/b15716b5af83cfb7bfd5bd13ecf985fc\"},\"headline\":\"How to Avoid Phishing Scams\",\"datePublished\":\"2020-12-28T13:58:03+00:00\",\"dateModified\":\"2021-03-29T12:44:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/how-to-avoid-phishing-scams\\\/\"},\"wordCount\":1858,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"keywords\":[\"Phishing\",\"scam\",\"security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/how-to-avoid-phishing-scams\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/how-to-avoid-phishing-scams\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/how-to-avoid-phishing-scams\\\/\",\"name\":\"How to Avoid Phishing Scams - KnownHost\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\"},\"datePublished\":\"2020-12-28T13:58:03+00:00\",\"dateModified\":\"2021-03-29T12:44:04+00:00\",\"description\":\"Phishing scams are created so that people give away sensitive info such as website logins or banking details. Here's how to avoid scams:\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/how-to-avoid-phishing-scams\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/how-to-avoid-phishing-scams\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/how-to-avoid-phishing-scams\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Avoid Phishing Scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"name\":\"KnownHost.com\",\"description\":\"Quality Managed Web Hosting by KnownHost\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\",\"name\":\"KnownHost, LLC\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"width\":1200,\"height\":400,\"caption\":\"KnownHost, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/KnownHost\\\/\",\"https:\\\/\\\/x.com\\\/KnownHost\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/knownhost\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/b15716b5af83cfb7bfd5bd13ecf985fc\",\"name\":\"Emily Moore\",\"sameAs\":[\"https:\\\/\\\/www.knownhost.com\"],\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/author\\\/emily-honeycutt\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Avoid Phishing Scams - KnownHost","description":"Phishing scams are created so that people give away sensitive info such as website logins or banking details. Here's how to avoid scams:","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.knownhost.com\/blog\/how-to-avoid-phishing-scams\/","og_locale":"en_US","og_type":"article","og_title":"How to Avoid Phishing Scams - KnownHost","og_description":"Phishing scams are created so that people give away sensitive info such as website logins or banking details. Here's how to avoid scams:","og_url":"https:\/\/www.knownhost.com\/blog\/how-to-avoid-phishing-scams\/","og_site_name":"KnownHost","article_publisher":"https:\/\/www.facebook.com\/KnownHost\/","article_published_time":"2020-12-28T13:58:03+00:00","article_modified_time":"2021-03-29T12:44:04+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2020\/12\/phishing-scam.png","type":"image\/png"}],"author":"Emily Moore","twitter_card":"summary_large_image","twitter_creator":"@KnownHost","twitter_site":"@KnownHost","twitter_misc":{"Written by":"Emily Moore","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.knownhost.com\/blog\/how-to-avoid-phishing-scams\/#article","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/how-to-avoid-phishing-scams\/"},"author":{"name":"Emily Moore","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/b15716b5af83cfb7bfd5bd13ecf985fc"},"headline":"How to Avoid Phishing Scams","datePublished":"2020-12-28T13:58:03+00:00","dateModified":"2021-03-29T12:44:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.knownhost.com\/blog\/how-to-avoid-phishing-scams\/"},"wordCount":1858,"commentCount":0,"publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"keywords":["Phishing","scam","security"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.knownhost.com\/blog\/how-to-avoid-phishing-scams\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.knownhost.com\/blog\/how-to-avoid-phishing-scams\/","url":"https:\/\/www.knownhost.com\/blog\/how-to-avoid-phishing-scams\/","name":"How to Avoid Phishing Scams - KnownHost","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/#website"},"datePublished":"2020-12-28T13:58:03+00:00","dateModified":"2021-03-29T12:44:04+00:00","description":"Phishing scams are created so that people give away sensitive info such as website logins or banking details. Here's how to avoid scams:","breadcrumb":{"@id":"https:\/\/www.knownhost.com\/blog\/how-to-avoid-phishing-scams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.knownhost.com\/blog\/how-to-avoid-phishing-scams\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.knownhost.com\/blog\/how-to-avoid-phishing-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.knownhost.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Avoid Phishing Scams"}]},{"@type":"WebSite","@id":"https:\/\/www.knownhost.com\/blog\/#website","url":"https:\/\/www.knownhost.com\/blog\/","name":"KnownHost.com","description":"Quality Managed Web Hosting by KnownHost","publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.knownhost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.knownhost.com\/blog\/#organization","name":"KnownHost, LLC","url":"https:\/\/www.knownhost.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","contentUrl":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","width":1200,"height":400,"caption":"KnownHost, LLC"},"image":{"@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/KnownHost\/","https:\/\/x.com\/KnownHost","https:\/\/www.linkedin.com\/company\/knownhost"]},{"@type":"Person","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/b15716b5af83cfb7bfd5bd13ecf985fc","name":"Emily Moore","sameAs":["https:\/\/www.knownhost.com"],"url":"https:\/\/www.knownhost.com\/blog\/author\/emily-honeycutt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/16961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/users\/182"}],"replies":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/comments?post=16961"}],"version-history":[{"count":0,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/16961\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/media?parent=16961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/categories?post=16961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/tags?post=16961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}