Dishing on Vishing and Phishing

Dishing on Vishing and Phishing

Fraudsters are lurking everywhere, sometimes even in plain sight if you know what to look for. Some hacker-favorite tactics include vishing and phishing. Not sure what these odd words mean? Here’s a quick IT vocab lesson.

vish-ing (noun)

the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers

phish-ing (noun)

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers

Simply put, vishing and phishing are ways hackers openly request sensitive information in sneaky ways. We at Liberty want to arm you with some insight into their most common methods, to help you and your data stay safe.

Hackers making vishing attempts like to single out departments in your organization such as the help desk, HR, sales and PR because these departments all have direct contact with clients and others outside the organization.

Vishing phone calls typically use a spoofed caller ID and VoIP technology. It may be a number you know, a local number, or an 800-number. Their tactics include posing as government agencies, banks, or credit card companies to name a few. They commonly claim that your account or information has been compromised, there has been fraudulent activity on your account, or you owe the IRS. After using these tactics to instill fear, they will request that you confirm personal information such as your SSN or credit card information.

The success of vishing relies on allowing no time for the recipient of the call to really process what the person on the other end of the phone is asking, and therefore can cause the target to reveal personal/sensitive information before they realize they are being scammed. To avoid this happening to you, go straight to the source. Hang up. Then look up the number to the organization/company that the caller claimed to represent and contact them directly to confirm whether or not the information you were told on the suspicious call is true.

Hackers using phishing tactics are looking to uncover the same personal information, via emails. They lure you in, again, with a sense of urgency and include a link that will request that you enter sensitive information. There are two ways a phishing email could be delivered to your inbox. First, it could be a blast email that was sent to millions. Or second, it could be a simple email that looks legitimate enough to gain your trust. “Response Required” and “Unusual Activity Suspected” are a few subject lines that can identify a phishing attempt. After you respond, it is then followed up by a phishing email.

Some forms of phishing emails include infected attachments that, when opened, can cause malware to gain unauthorized access to your user accounts or machines that come in the form of infected attachments. Phishing scams are at the root of over 90% of successful hacks and data breaches, so it’s vital that you and your organization learn to recognize these schemes from the start. The best way to avoid user-end breaches and hacks are to implement the following best practices regarding phishing emails:

  • Think before you click and avoid clicking on links that appear in random emails or direct messages
  • Go directly to a company’s site before following links through a suspicious email; were you expecting to receive this attachment or does it seem “out of the blue”?
  • Keep your browser updated
  • Use firewalls
  • Be suspicious of pop-ups
  • Check the sender and reply email addresses to verify correct spellings and domains; suspicious emails may come from addresses that are similar but slightly off from a legitimate company’s spellings/domains
  • Avoid using personal devices or logging into personal accounts on your company network

Vishing and phishing are hackers’ attempts at going straight to the source that has all the info they need, you. Knowing how to recognize them and their tactics is the best defense line to keep your personal and company data protected.

To learn about more ways to protect your data, reach out to us at

Back Next

Recent Blogs

Dishing on Vishing and Phishing

Unlocking Efficiency: The Benefits of Cisco Unified Communications for Your Business

Effective communication is the cornerstone of success in the dynamic realm of modern business. As companies strive to enhance collaboration and streamline communication processes, adopting Cisco Unified Communications Solutions is a strategic move. Today, we’re exploring the myriad advantages businesses can reap by harnessing the power of Cisco collaboration products, emphasizing how Liberty Technology’s IT […]
Feb 1st, 2024
Dishing on Vishing and Phishing

Looking Ahead: IT Trends for 2024

Navigating the Future: IT Trends for 2024 In the ever-evolving landscape of technology, staying ahead of the curve is not just an advantage; it’s a necessity. As we stand at the threshold of 2024, businesses must anticipate the upcoming trends that will shape the IT landscape. Let’s explore the critical IT trends for 2024 and […]
Jan 1st, 2024
Dishing on Vishing and Phishing

2023: A Year of Collective Strength, Community Commitment, and Forward Thinking at Liberty Technology

Hello everyone, As we eagerly anticipate the arrival of 2024, we at Liberty Technology want to take a moment to reflect on 2023. It’s been a year of significant challenges, but also one of immense growth and community spirit. Our Community: Coming Together in Times of Need The year began on a challenging note with […]
Dec 11th, 2023
Dishing on Vishing and Phishing

What Can a VCIO Do for You?

In an ever-evolving digital world, businesses are constantly looking for ways to stay on top of technological advancements and stay competitive. Often, the responsibility falls on the shoulders of a Chief Information Officer (CIO). But for many small and medium-sized businesses, hiring a full-time CIO might not be feasible. Enter the VCIO – Virtual Chief […]
Nov 1st, 2023
Dishing on Vishing and Phishing

Cybersecurity for 2023

Every day, tech continues to amaze (and frighten) us with increasingly impressive products, AI, and speed. While these developments increase productivity and our overall good, some individuals will inevitably twist new tech for their nefarious purposes. Among the many worries that circle our safety online, one of the most concerning is being hacked, especially in […]
Oct 2nd, 2023
Dishing on Vishing and Phishing

Advantages of the Verkada Cloud-Based Physical Security System

Today, physical security is more important than ever. There are many options available to protect your business and commercial property, but selecting a high-quality security system is the most important way to guarantee maximum security. The brand that stands out from the rest is Verkada. Keep reading to learn about the advantages of choosing Verkada […]
Sep 1st, 2023
Dishing on Vishing and Phishing

What Are the Benefits of Managed IT Services?

Nearly every business requires IT services. Without them, technology could be hard to manage, rendering a company’s process less efficient and rough. In short, IT services in Macon, GA, are essential to keeping your local business running smoothly. They also change with the times and adapt to the constant improvements in technology. Ideal IT services […]
Aug 1st, 2023
Dishing on Vishing and Phishing

The Risks of a Non-Secure Server

In a business, servers could be called the “heart” of the building. Depending on the type, servers hold most or all of a company’s data, down to the most secure information such as documents, executables (a file used to perform operations or functions on a computer), and even photos or videos. Needless to say, when […]
Jul 3rd, 2023
Dishing on Vishing and Phishing

Are You Ready for the Post-COVID Hybrid Work Model?

Covid forever changed the way we work. Is your office capable of handling the demands the hybrid office places on it? Is your network set up for success? Is your data and hardware secure? If not, you’re going to fall behind your competition. The new workspace is changing, mostly for the better. Below you’ll find […]
Jun 1st, 2023
Dishing on Vishing and Phishing

Common Cloud Security Mistakes

A common practice for storing data is using the “cloud,” the system of internet-accessed storage, networking, software, and more. There are many services now offering space for all our files, programs, and applications, and this option has become critical to many individuals and businesses. This type of storage has plenty of advantages, such as remote […]
May 2nd, 2023
Dishing on Vishing and Phishing

Understanding the Risks of Outdated Tech

We all want our electronic devices to serve us well. We want to get our work done efficiently, without hiccups, viruses, software or hardware issues, and without any problems, period. But since there aren’t any perfect machines (not yet, anyway), devices will always have their limits. Technology problems are so frustrating and common because we […]
Apr 10th, 2023
Dishing on Vishing and Phishing

The Liberty Tech Difference: Data Security

The best way to get hacked is to think you won’t be. Liberty Technology offers the most comprehensive security package available, powered by Cisco’s Advanced Security Architecture. Your business data needs to be protected, and the best defense against today’s advanced security threats is a good offense–one that outsmarts emerging threats while they’re still just […]
Mar 1st, 2023