{"id":18559,"date":"2021-12-28T09:55:46","date_gmt":"2021-12-28T08:55:46","guid":{"rendered":"https:\/\/stage-fp.webenv.pl\/blog\/?p=18559"},"modified":"2024-07-26T15:26:59","modified_gmt":"2024-07-26T13:26:59","slug":"how-to-detect-and-fight-phishing","status":"publish","type":"post","link":"https:\/\/www.future-processing.com\/blog\/how-to-detect-and-fight-phishing\/","title":{"rendered":"How to detect and fight phishing?"},"content":{"rendered":"\n<p><strong>As cyberattacks are being launched every <a href=\"https:\/\/ung.edu\/continuing-education\/news-and-media\/cybersecurity.php\" target=\"_blank\" rel=\"noreferrer noopener\">39 seconds on average<\/a><\/strong>, the cybersecurity of organisations is one of the top priorities for now and the following years. Companies worldwide need a holistic approach and <a href=\"https:\/\/www.future-processing.com\/blog\/how-to-prepare-a-cyber-secure-home-office\/\" target=\"_blank\" rel=\"noreferrer noopener\">tech solutions that fit individual need<\/a>s and include a complex business landscape (with remote work as an essential field to cover).<\/p>\n\n\n\n<p>Due to the outburst of the COVID-19 pandemic, 2020 was the worst in terms of the number and sophistication of cyberattacks. Hackers worked extremely hard to take advantage of those tough times by committing such cyber crimes as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>BEC attacks (Business Email Compromise attacks),<\/li>\n\n\n\n<li>ransomware attacks,<\/li>\n\n\n\n<li>mobile malware,<\/li>\n\n\n\n<li>cyberactivism,<\/li>\n\n\n\n<li>data breaches,<\/li>\n\n\n\n<li>phishing.<\/li>\n<\/ul>\n\n\n    <div class=\"b-image js-lightbox\">\n        <figure class=\"b-image__figure\">\n            <a\n                href=\"Number-of-brands-and-legitimate-entities-targeted-by-phishing-attacks.jpg\"\n                class=\"js-lightbox__trigger\"\n                aria-haspopup=\"dialog\"\n                data-elementor-open-lightbox=\"no\"\n            >\n                <img fetchpriority=\"high\" decoding=\"async\" width=\"1923\" height=\"1438\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/Number-of-brands-and-legitimate-entities-targeted-by-phishing-attacks.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/Number-of-brands-and-legitimate-entities-targeted-by-phishing-attacks.jpg 1923w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/Number-of-brands-and-legitimate-entities-targeted-by-phishing-attacks-300x224.jpg 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/Number-of-brands-and-legitimate-entities-targeted-by-phishing-attacks-1024x766.jpg 1024w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/Number-of-brands-and-legitimate-entities-targeted-by-phishing-attacks-768x574.jpg 768w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/Number-of-brands-and-legitimate-entities-targeted-by-phishing-attacks-1536x1149.jpg 1536w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/Number-of-brands-and-legitimate-entities-targeted-by-phishing-attacks-535x400.jpg 535w\" sizes=\"(max-width: 1923px) 100vw, 1923px\" \/>            <\/a>\n                            <figcaption class=\"b-image__caption f-paragraph\">https:\/\/www.statista.com\/statistics\/266156\/number-of-brands-hijacked-by-phishing-attacks\/  <\/figcaption>\n                    <\/figure>\n        <div\n    class=\"js-lightbox__dialog o-lightbox\"\n    role=\"dialog\"\n    aria-modal=\"true\"\n    aria-hidden=\"true\"\n    tabindex=\"-1\"\n>\n    <div class=\"o-lightbox__dialog\">\n        <div class=\"o-lightbox__content js-lightbox__content\" role=\"document\">\n            <button\n                class=\"o-button o-button--xs o-button--dark o-button--icon-right o-button--tertiary o-lightbox__close js-lightbox__close m-gradient-brand\"\n            >\n                Close picture                <svg class='o-icon o-icon--16 o-icon--timescircle '>\n            <use xlink:href='#icon-16_times-circle'><\/use>\n          <\/svg>            <\/button>\n                                            <figure class=\"o-lightbox__image is-active\">\n                    <img fetchpriority=\"high\" decoding=\"async\" width=\"1923\" height=\"1438\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/Number-of-brands-and-legitimate-entities-targeted-by-phishing-attacks.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/Number-of-brands-and-legitimate-entities-targeted-by-phishing-attacks.jpg 1923w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/Number-of-brands-and-legitimate-entities-targeted-by-phishing-attacks-300x224.jpg 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/Number-of-brands-and-legitimate-entities-targeted-by-phishing-attacks-1024x766.jpg 1024w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/Number-of-brands-and-legitimate-entities-targeted-by-phishing-attacks-768x574.jpg 768w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/Number-of-brands-and-legitimate-entities-targeted-by-phishing-attacks-1536x1149.jpg 1536w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/Number-of-brands-and-legitimate-entities-targeted-by-phishing-attacks-535x400.jpg 535w\" sizes=\"(max-width: 1923px) 100vw, 1923px\" \/>                                            <figcaption\n                            class=\"o-lightbox__caption f-paragraph\">https:\/\/www.statista.com\/statistics\/266156\/number-of-brands-hijacked-by-phishing-attacks\/  <\/figcaption>\n                                    <\/figure>\n                    <\/div>\n    <\/div>\n<\/div>\n    <\/div>\n\n\n    <div class=\"b-image js-lightbox\">\n        <figure class=\"b-image__figure\">\n            <a\n                href=\"How-to-detect-and-fight-phishing-2_to-publish-28.12.jpg\"\n                class=\"js-lightbox__trigger\"\n                aria-haspopup=\"dialog\"\n                data-elementor-open-lightbox=\"no\"\n            >\n                <img decoding=\"async\" width=\"1795\" height=\"1384\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing-2_to-publish-28.12.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing-2_to-publish-28.12.jpg 1795w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing-2_to-publish-28.12-300x231.jpg 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing-2_to-publish-28.12-1024x790.jpg 1024w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing-2_to-publish-28.12-768x592.jpg 768w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing-2_to-publish-28.12-1536x1184.jpg 1536w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing-2_to-publish-28.12-519x400.jpg 519w\" sizes=\"(max-width: 1795px) 100vw, 1795px\" \/>            <\/a>\n                            <figcaption class=\"b-image__caption f-paragraph\">Source: https:\/\/www.statista.com\/statistics\/266161\/websites-most-affected-by-phishing\/  <\/figcaption>\n                    <\/figure>\n        <div\n    class=\"js-lightbox__dialog o-lightbox\"\n    role=\"dialog\"\n    aria-modal=\"true\"\n    aria-hidden=\"true\"\n    tabindex=\"-1\"\n>\n    <div class=\"o-lightbox__dialog\">\n        <div class=\"o-lightbox__content js-lightbox__content\" role=\"document\">\n            <button\n                class=\"o-button o-button--xs o-button--dark o-button--icon-right o-button--tertiary o-lightbox__close js-lightbox__close m-gradient-brand\"\n            >\n                Close picture                <svg class='o-icon o-icon--16 o-icon--timescircle '>\n            <use xlink:href='#icon-16_times-circle'><\/use>\n          <\/svg>            <\/button>\n                                            <figure class=\"o-lightbox__image is-active\">\n                    <img decoding=\"async\" width=\"1795\" height=\"1384\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing-2_to-publish-28.12.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing-2_to-publish-28.12.jpg 1795w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing-2_to-publish-28.12-300x231.jpg 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing-2_to-publish-28.12-1024x790.jpg 1024w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing-2_to-publish-28.12-768x592.jpg 768w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing-2_to-publish-28.12-1536x1184.jpg 1536w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing-2_to-publish-28.12-519x400.jpg 519w\" sizes=\"(max-width: 1795px) 100vw, 1795px\" \/>                                            <figcaption\n                            class=\"o-lightbox__caption f-paragraph\">Source: https:\/\/www.statista.com\/statistics\/266161\/websites-most-affected-by-phishing\/  <\/figcaption>\n                                    <\/figure>\n                    <\/div>\n    <\/div>\n<\/div>\n    <\/div>\n\n\n\n<p>As <a href=\"https:\/\/www.gartner.com\/en\/articles\/the-top-8-cybersecurity-predictions-for-2021-2022\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner predicts<\/a>, <strong>by 2024, organisations adopting a cybersecurity mesh architecture will have reduced the financial impact of security incidents by an average of 90%.<\/strong> Before it happens, a lot has to be done to raise the business security level. Let\u2019s focus on phishing and find out what companies can do to protect themselves.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>What is phishing?<\/h2>\n\n\n\n<p><strong>It is the practice of tricking Internet users (by means of deceptive email messages or websites) into <a href=\"https:\/\/www.merriam-webster.com\/dictionary\/phishing\" target=\"_blank\" rel=\"noreferrer noopener\">disclosing personal or confidential information<\/a> which can then be used illicitly<\/strong>. An American hacker first introduced the term in 1996 as an attempt to retrieve confidential information using email.<\/p>\n\n\n    <div class=\"b-image js-lightbox\">\n        <figure class=\"b-image__figure\">\n            <a\n                href=\"How-to-detect-and-fight-phishing_to-publish-28.12.jpg\"\n                class=\"js-lightbox__trigger\"\n                aria-haspopup=\"dialog\"\n                data-elementor-open-lightbox=\"no\"\n            >\n                <img decoding=\"async\" width=\"1427\" height=\"879\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing_to-publish-28.12.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing_to-publish-28.12.jpg 1427w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing_to-publish-28.12-300x185.jpg 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing_to-publish-28.12-1024x631.jpg 1024w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing_to-publish-28.12-768x473.jpg 768w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing_to-publish-28.12-649x400.jpg 649w\" sizes=\"(max-width: 1427px) 100vw, 1427px\" \/>            <\/a>\n                            <figcaption class=\"b-image__caption f-paragraph\">Source: https:\/\/www.tessian.com\/blog\/phishing-statistics-2020\/  <\/figcaption>\n                    <\/figure>\n        <div\n    class=\"js-lightbox__dialog o-lightbox\"\n    role=\"dialog\"\n    aria-modal=\"true\"\n    aria-hidden=\"true\"\n    tabindex=\"-1\"\n>\n    <div class=\"o-lightbox__dialog\">\n        <div class=\"o-lightbox__content js-lightbox__content\" role=\"document\">\n            <button\n                class=\"o-button o-button--xs o-button--dark o-button--icon-right o-button--tertiary o-lightbox__close js-lightbox__close m-gradient-brand\"\n            >\n                Close picture                <svg class='o-icon o-icon--16 o-icon--timescircle '>\n            <use xlink:href='#icon-16_times-circle'><\/use>\n          <\/svg>            <\/button>\n                                            <figure class=\"o-lightbox__image is-active\">\n                    <img decoding=\"async\" width=\"1427\" height=\"879\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing_to-publish-28.12.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing_to-publish-28.12.jpg 1427w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing_to-publish-28.12-300x185.jpg 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing_to-publish-28.12-1024x631.jpg 1024w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing_to-publish-28.12-768x473.jpg 768w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/12\/How-to-detect-and-fight-phishing_to-publish-28.12-649x400.jpg 649w\" sizes=\"(max-width: 1427px) 100vw, 1427px\" \/>                                            <figcaption\n                            class=\"o-lightbox__caption f-paragraph\">Source: https:\/\/www.tessian.com\/blog\/phishing-statistics-2020\/  <\/figcaption>\n                                    <\/figure>\n                    <\/div>\n    <\/div>\n<\/div>\n    <\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Beware of different types of phishing<\/h2>\n\n\n\n<p>Phishing has more than one name. We need to be aware that hackers are busy inventing brand new ways of deceiving users and luring them into clicking a link, accessing certain apps, or sharing login information. There are a few different types of phishing attacks we need to pay attention to:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>Spear phishing<\/h3>\n\n\n\n<p>These phishing attempts are directed at specific companies or individuals. What makes them different from standard phishing is that <strong>spear phishing attackers would frequently gather personal information about their target first and then use it to increase their chances of success<\/strong>. <\/p>\n\n\n\n<p>A famous example of a spear phishing attack is the case of Threat Group-4127 who targeted email accounts linked to Hillary Clinton\u2019s 2016 presidential campaign. The group attacked more than 1,800 Google accounts implementing the accounts-google.com domain to threaten its targeted users.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>Whaling<\/h3>\n\n\n\n<p>It is a type of <strong>spear phishing attack explicitly directed at senior-level executives and other high-profile persons<\/strong>. The email content will be drafted to reach a crucial managerial role in the company. It could contain an executive issue such as claiming to take legal action against the company or a serious client\u2019s complaint.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>Clone phishing<\/h3>\n\n\n\n<p>In a clone phishing attack, <strong>a legitimate and previously delivered email message containing an attachment or link would have its content and recipient\u2019s address used to produce an almost identical message<\/strong>. In the new message, the attachment or link would be replaced with a malicious version and sent from an email address made to look like it comes from the original sender. <\/p>\n\n\n\n<p>To appear legitimate, the new message may say it is an updated version of the original. This technique of using social trust could be taken advantage of to access a new computer from a previously infected device.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>SMiShing, ViShing and others<\/h3>\n\n\n\n<p>Phishing does not stop at emails. <strong>SMiShing is a type of attack which is done by SMS messages<\/strong>. SMS messages will ask you to call a specific number or visit a spoofed website to take action.<\/p>\n\n\n\n<p><strong>ViShing<\/strong> <strong>is another type of attack where you can receive a call from an automatic voice system<\/strong> to collect sensitive information. These attacks can be even more harmful than typical email scams, as the public awareness of this type of attack is still relatively low.<\/p>\n\n\n<div class=\"b-button\">\n            <a class=\"o-button o-button--primary o-button--s o-button--icon-right o-button--arrow\" href=\"https:\/\/www.future-processing.com\/documents\/security_services_future_processing_en.pdf\">\n            Read about Security Services\n            <svg class='o-icon o-icon--16 o-icon--arrow '>\n            <use xlink:href='#icon-16_arrow'><\/use>\n          <\/svg>\n                            <svg class='o-icon o-icon--24 o-icon--arrow '>\n            <use xlink:href='#icon-24_arrow'><\/use>\n          <\/svg>                    <\/a>\n    <\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Tricky phishing tactics<\/h2>\n\n\n\n<p>Hackers search for <strong>potential victims\u2019 weak points and use psychological tricks<\/strong> to lull them into a false sense of security. The best thing we can do is know hackers\u2019 tactics to stay focused and double-check every suspicious email, link or push message. There are common tricks that should raise red flags to avoid falling into a trap:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>A sense of urgency<\/h3>\n\n\n\n<p>Attackers try to make an impression of urgency, and the call-to-action is highlighted sometimes with an additional scare tactic of losing access to your account or money. It sounds like they care about your stuff more than you do: \u201cQuick, take action to save what\u2019s valuable for you!\u201d <\/p>\n\n\n    <div class=\"o-icon-box__wrapper\">\n        <div class=\"o-icon-box o-icon-box--big o-icon-box--italics m-cool-gray-light\">\n            <div class=\"o-icon-box__text f-headline-extra-big\">\n                Before clicking that link, check who\u2019s sending it, contact your financial advisor or call your bank to double-check.            <\/div>\n        <\/div>\n    <\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><br>A \u201creal\u201d sender<\/h3>\n\n\n\n<p><strong>The sender\u2019s name looks like someone you know, but the email address has one or more characters changed<\/strong>. For example, suppose the address has the letter M (@freshmarket.com). In that case, attackers often send messages from another domain with the characters R and N (@freshrnarket.com), giving you the impression that the address is correct. Usually, it\u2019s hard to detect it without going through the whole address letter by letter, but it\u2019s worth checking.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>Links in messages<\/h3>\n\n\n\n<p>Rolling over the links could show a different address than displayed. The address could also have a few characters changed, use similar-looking letters, e.g. <strong>with diacritics from other alphabets and\/or lead to an unprotected website<\/strong> (HTTP instead of HTTPS). Double-checking the form of the link is also highly advised here.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>Attachments and unusual files<\/h3>\n\n\n\n<p>Messages sometimes contain additional attachments. For example, if you used to get an invoice in a PDF document, but this time it came as a ZIP archive, it should raise your attention.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>How&nbsp;can&nbsp;we&nbsp;avoid&nbsp;phishing?&nbsp;&nbsp;<\/h2>\n\n\n\n<p>Phishing has many names, and hackers\u2019 tricks and scams are becoming more and more sophisticated with time. But as cybersecurity becomes one of the top priorities for companies, <strong>there are plenty of actions to take to make our businesses safer and scam-free.<\/strong> <\/p>\n\n\n\n<p>These are tailored tech solutions, employee education and knowledge sharing, and support of experienced cyber <a href=\"https:\/\/www.future-processing.com\/blog\/security-in-software-development-2021-guide-for-it-business-leaders\/\" target=\"_blank\" rel=\"noreferrer noopener\">security specialists<\/a>. They can help you create a cybersecurity plan that fits your business needs and threats.<br><\/p>\n\n\n<div class=\"b-cta-banner m-gradient-light\">\n            <a href=\"https:\/\/www.future-processing.com\/services\/consulting\/audits\/\" class=\"b-cta-banner__image-container\" data-elementclick=\"article-banner\" data-elementname=\"Software audits\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"450\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/08\/Software-Audits.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/08\/Software-Audits.png 450w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/08\/Software-Audits-300x300.png 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/08\/Software-Audits-150x150.png 150w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/08\/Software-Audits-400x400.png 400w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/08\/Software-Audits-24x24.png 24w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/08\/Software-Audits-48x48.png 48w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2021\/08\/Software-Audits-96x96.png 96w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/>        <\/a>\n    \n        <a href=\"https:\/\/www.future-processing.com\/services\/consulting\/audits\/\" class=\"b-cta-banner__url b-cta-banner__text-container\" data-elementclick=\"article-banner\" data-elementname=\"Software audits\">\n                    <div class=\"b-cta-banner__text\">\n                                                    <h3 class=\"f-headline-extra-big b-cta-banner__header\">\n                        Software audits                    <\/h3>\n                \n                                    <div class=\"f-paragraph\">\n                        <p>Ensure your system is\u00a0<strong>developed with respect to industry standards<\/strong>\u00a0and protect the future of your business\u2019 most valuable assets.<\/p>\n                    <\/div>\n                \n                                    <div class=\"o-button o-button--primary o-button--s o-button--icon-right o-button--arrow\">\n                        <span>Security Audits<\/span>\n                        <svg class='o-icon o-icon--16 o-icon--arrow '>\n            <use xlink:href='#icon-16_arrow'><\/use>\n          <\/svg>                    <\/div>\n                            <\/div>\n                <\/a>\n    <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Phishing is an example of the most frequent and dangerous cyber attacks affecting both individuals and businesses all over the world. The global pandemic, the urge to work from home and the rapid development of online services have become an excellent opportunity for hackers to steal priceless data. Let\u2019s find out what can be done to increase the level of security and avoid phishing soon.<\/p>\n","protected":false},"author":182,"featured_media":18586,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[980],"tags":[],"coauthors":[2010],"class_list":["post-18559","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-software-development"],"acf":{"reading-time":"5 min","show-toc-sublists":false,"image":null,"logo":null,"button1":{"button1_type":"","button":null},"button2":{"button2_type":"","button":null},"person":{"person_photo":null,"person_name":"","person_position":""}},"_links":{"self":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/posts\/18559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/users\/182"}],"replies":[{"embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/comments?post=18559"}],"version-history":[{"count":0,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/posts\/18559\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/media\/18586"}],"wp:attachment":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/media?parent=18559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/categories?post=18559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/tags?post=18559"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/coauthors?post=18559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}