Forbes: What is Vishing, and Why is it a Threat to Your Financial Health? | Press Release

Forbes: What is Vishing, and Why is it a Threat to Your Financial Health?

Posted on August 31, 2022 | Cybersecurity , Data Security

In his August contribution to Forbes Advisor, John Wilson explains what vishing is, the most common vishing scams and how individuals and organizations can protect themselves from vishing scammers.

Originally published in Forbes Advisor

“With robocalls, telemarketers and full-on cybercriminals all trying to reach you, answering the phone has become quite a risk. Today’s phone-based fraud—called voice phishing, or “vishing”—uses manipulative tactics to get victims to reveal private information that can be used for digital theft. According to research from HelpSystems, the prevalence of these schemes is at an all-time high.”

Read the full article here.

Recent News
September 28, 2022
It’s difficult to control your Social Security number in the wild. In his September contribution to Forbes Advisor, John Wilson discusses the most common scams involving Social Security numbers and provides 8 steps individuals can take to prevent identity fraud.
September 22, 2022
Agari, Alert Logic, Digital Defense, Digital Guardian, and Tripwire, all by HelpSystems, were recognized in Expert Insights’ “Best-Of” Awards for Fall 2022.
September 20, 2022
Whether intentional or otherwise, the Insider Threat poses a serious risk to business. HelpSystems’ experts, Bob Erdman, John Grancarich and Tom Huntington highlight the risks in this Digital Journal article and describe the solutions organizations can implement to help prevent malicious actors.
September 20, 2022
Credence Security, a leading regional distributor of specialized solutions in cybersecurity, forensics, governance, risk, and compliance, has signed a distribution agreement with HelpSystems, a cybersecurity and automation software provider, to deliver their expansive portfolio across the UAE and wider GCC region.
September 16, 2022

In his article for Tech Native, John Grancarich simplifies Zero Trust, and provides 7 steps organizations can take to implement a Zero Trust architecture.