{"id":1988,"date":"2016-09-27T11:01:07","date_gmt":"2016-09-27T16:01:07","guid":{"rendered":"http:\/\/www.stratospherenetworks.com\/blog\/?p=1988"},"modified":"2018-06-26T12:04:08","modified_gmt":"2018-06-26T17:04:08","slug":"spear-phishing-what-it-is-and-how-to-handle-it","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/","title":{"rendered":"Spear Phishing: What it is and How to Handle it"},"content":{"rendered":"<p><a href=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2014\/05\/security.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-1552\" src=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2014\/05\/security-300x200.jpg\" alt=\"cyber security\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2014\/05\/security-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2014\/05\/security.jpg 849w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>The Internet is rife with an assortment of threats. Since the early days of <a href=\"http:\/\/www.stratospherenetworks.com\/email-spam.html\" target=\"_blank\">spam<\/a> and adware, malicious programs have been looking for ways to brick your system. Viruses, executables, and most recently phishing scams now form a network of <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/\" target=\"_blank\">problematic threats<\/a>.<\/p>\n<p><a href=\"http:\/\/www.stratospherenetworks.com\/what-you-should-know-about-phishing-malware-infographic.html\" target=\"_blank\">Phishing<\/a> has become especially popular over the last few years. One method in particular called \u201cspear phishing\u201d is among the more dangerous and successful methods used by third parties to steal your information.<\/p>\n<p>Spear phishing essentially works by trying to hijack your information through links, typically found in emails. While that sounds easy enough to spot, phishing scams and their related payload emails have gotten better at disguising their purpose. They cloak themselves with the dressings of a professional email, working to look as official as possible.<\/p>\n<p>One such example would be spear phishing emails that look like they come from PayPal. Everything from the sender address to the logo to the email\u2019s construction all appear like the real thing. However, it\u2019s the content that\u2019s usually strange. The email claims there\u2019s a problem with a person\u2019s account, usually trying to get them to react quickly to a nonexistent problem. They might even claim the account has been compromised, providing a convenient link to \u201creset\u201d their account information. What\u2019s actually happening, however, is nothing has changed, and entering the account info gives hackers direct access to that person\u2019s PayPal.<\/p>\n<p>On top of this, you might see an email from a \u201cfriend\u201d or an address you recognize. The pattern here is malicious third-parties are trying to use familiarity against you. They rely on a lack of scrutiny and curiosity to make their move, and typically by the time a person realizes something is wrong, it\u2019s too late.<\/p>\n<p>So how do you deal with it? Essentially it\u2019s a mix of practicing skepticism and adjusting how much personal information you make available. Social media exposes us in numerous ways, and that\u2019s what the hackers look for: How many friends you have, places you work, and things you like. If you have too much information regarding accounts or official business items, you might want to consider cutting down.<\/p>\n<p>As always, it\u2019s important to practice lots of skepticism. Official emails don\u2019t typically alert you to account problems without specifying exactly what it is. For example, if an unknown computer tried to log into your account, it\u2019s likely you\u2019d receive an alert for it. Emails that seem official but feel shady are worth avoiding. It\u2019s better to avoid any email links and go straight to the account to see if something is actually wrong.<\/p>\n<p>Above all, maintain a careful approach towards anything you don\u2019t trust completely and always be on the lookout for suspicious sounding emails.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet is rife with an assortment of threats. Since the early days of spam and adware, malicious programs have been looking for ways to brick your system. Viruses, executables, and most recently phishing scams now form a network of &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1988","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledge-base"],"yoast_head":"<title>Spear Phishing: What it is and How to Handle it<\/title>\n<meta name=\"description\" content=\"Hackers use spear phishing to attempt to hijack your information through deceptive emails. Here&#039;s how to avoid falling for this dangerous technique.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spear Phishing: What it is and How to Handle it\" \/>\n<meta property=\"og:description\" content=\"Hackers use spear phishing to attempt to hijack your information through deceptive emails. Here&#039;s how to avoid falling for this dangerous technique.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-27T16:01:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-26T17:04:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"Spear Phishing: What it is and How to Handle it\",\"datePublished\":\"2016-09-27T16:01:07+00:00\",\"dateModified\":\"2018-06-26T17:04:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/\"},\"wordCount\":477,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Knowledge Base\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/\",\"name\":\"Spear Phishing: What it is and How to Handle it\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2016-09-27T16:01:07+00:00\",\"dateModified\":\"2018-06-26T17:04:08+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"Hackers use spear phishing to attempt to hijack your information through deceptive emails. Here's how to avoid falling for this dangerous technique.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Spear Phishing: What it is and How to Handle it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"Spear Phishing: What it is and How to Handle it","description":"Hackers use spear phishing to attempt to hijack your information through deceptive emails. Here's how to avoid falling for this dangerous technique.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/","og_locale":"en_US","og_type":"article","og_title":"Spear Phishing: What it is and How to Handle it","og_description":"Hackers use spear phishing to attempt to hijack your information through deceptive emails. Here's how to avoid falling for this dangerous technique.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2016-09-27T16:01:07+00:00","article_modified_time":"2018-06-26T17:04:08+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"Spear Phishing: What it is and How to Handle it","datePublished":"2016-09-27T16:01:07+00:00","dateModified":"2018-06-26T17:04:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/"},"wordCount":477,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Knowledge Base"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/","name":"Spear Phishing: What it is and How to Handle it","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2016-09-27T16:01:07+00:00","dateModified":"2018-06-26T17:04:08+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"Hackers use spear phishing to attempt to hijack your information through deceptive emails. Here's how to avoid falling for this dangerous technique.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Spear Phishing: What it is and How to Handle it"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=1988"}],"version-history":[{"count":1,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1988\/revisions"}],"predecessor-version":[{"id":1989,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1988\/revisions\/1989"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=1988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=1988"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=1988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}