{"id":31654,"date":"2022-04-10T05:53:00","date_gmt":"2022-04-10T12:53:00","guid":{"rendered":"https:\/\/www.yardi.com\/blog\/?p=31654"},"modified":"2022-04-13T14:02:55","modified_gmt":"2022-04-13T21:02:55","slug":"step-up-security","status":"publish","type":"post","link":"https:\/\/www.yardi.com\/blog\/step-up-security\/","title":{"rendered":"Step Up Security"},"content":{"rendered":"\n<p>Perhaps you\u2019ve noticed it in your email inbox or text messages: there is a recent uptick in the number of attempts to gain private information that compromises your personal and financial security, as well as that of organizations and corporations.<\/p>\n\n\n\n<p>According to a recent report from Proofpoint, email-based phishing attempts became increasingly successful in 2021, as did ransomware attacks. As many as 83 percent of organizations said they experienced a successful email-based phishing attack in 2021, compared to 57 percent in 2020. These upticks appear to be continuing in 2022.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2022\/04\/rsz_adobestock_351107805.jpg?w=1000\" alt=\"data phishing hacking online scam concept, with laptop and envelope hook\" class=\"wp-image-31656\" width=\"250\" height=\"217\" srcset=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2022\/04\/rsz_adobestock_351107805.jpg 1000w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2022\/04\/rsz_adobestock_351107805.jpg?resize=768,666 768w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2022\/04\/rsz_adobestock_351107805.jpg?w=400 400w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2022\/04\/rsz_adobestock_351107805.jpg?w=500 500w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2022\/04\/rsz_adobestock_351107805.jpg?w=600 600w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2022\/04\/rsz_adobestock_351107805.jpg?w=720 720w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2022\/04\/rsz_adobestock_351107805.jpg?w=800 800w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\" \/><\/figure><\/div>\n\n\n\n<p>Across a variety of industries, phishing attacks are becoming more prolific and targeting employees from entry-level to executives. That means it\u2019s more important than ever to protect yourself and your business by exercising vigilant technology safety protocols and learning best prevention practices.<\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/tips\/ST04-014\">U.S. Cyberinfrastructure and Security Agency<\/a> (CISA) offers the following tips that can help you and your organization avoid these attacks.<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><strong>Understand the threat. <\/strong>Phishing is a form of a social engineering attack, which means that common social norms are used to gain and compromise information about a company and its technology systems. Messages claim to be legitimate communications from vendors, banks, employees and other business contacts, but are really fraudulent attempts to obtain confidential information from recipients. The imposter may even offer information that claims to support their identity.<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Be skeptical, even when a message appears to be from a trusted source. <\/strong>An attacker may send email seemingly from a reputable credit card company or financial institution that requests account information, often suggesting that there is a problem. They could also pose as a vendor who needs account information changed or even an internal employee who claims to need verification of information. When users respond with the requested details, hackers can use it to gain access to accounts.<strong><\/strong><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Learn the common indicators of phishing attempts. <\/strong>They include:<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Suspicious sender\u2019s address.&nbsp;<\/strong>The sender&#8217;s address may imitate a legitimate business or closely resemble one from a reputable company by changing a few characters.&nbsp;<\/li><li><strong>Generic greetings and signature.&nbsp;<\/strong>A general greeting like \u201cDear Valued Customer\u201d or \u201cSir\/Ma\u2019am\u201d and a lack of contact information are often indicators of a fake email.<\/li><li><strong>Spoofed hyperlinks and websites.<\/strong> Malicious websites may look identical to a legitimate site, but the URL may be shortened or use a variation in spelling or a different domain (such as .com or .org instead of .net).<\/li><li><strong>Spelling and layout.&nbsp;<\/strong>Poor grammar and sentence structure, misspellings, and inconsistent formatting sometimes signify a phishing attempt.<\/li><li><strong>Suspicious attachments.&nbsp;<\/strong>An unsolicited email requesting you download and open an attachment is a common vehicle for malware.<\/li><li><strong>Recognize other types of scams.<\/strong><strong> <\/strong>\u201cVishing\u201d is a social engineering attack that uses voice communication to result in sensitive information being provided over the phone. Attackers can use VoIP and caller-ID masking to falsify their identities. \u201cSmishing\u201d is the use of text messages with links that when clicked, may automatically open a malicious browser window, email message or dial a number.<strong><\/strong><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Know how to avoid being a victim and what to do if you are. <\/strong>CISA offers a full list of best practices to recognize scams, as well as how to proceed if you believe you have been successfully targeted. These are great resources to share with your entire organization. <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/tips\/ST04-014\">Find them here.<\/a><strong><\/strong><\/li><\/ul>\n\n\n\n<p>Proofpoint also recently reported that <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/school-hard-knocks-job-fraud-threats-target-university-students\">fake job offer emails<\/a> are becoming increasingly common. The bottom line: no matter what type of communications you\u2019re receiving, exercise extreme vigilance to protect yourself and your business from bad actors and the challenges of undoing the damaged caused by a successful phishing attempt.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Perhaps you\u2019ve noticed it in your email inbox or text messages: there is a recent uptick in the number of attempts to gain private information that compromises your personal and financial security, as well as that of organizations and corporations. According to a recent report from Proofpoint, email-based phishing attempts became increasingly successful in 2021, [&hellip;]<\/p>\n","protected":false},"author":413,"featured_media":31656,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_s2mail":"yes","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6],"tags":[3042,717,3041,91],"class_list":["post-31654","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-email-scams","tag-it","tag-phishing","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Yardi Blog<\/title>\n<meta name=\"description\" content=\"Perhaps you\u2019ve noticed it in your email inbox or text messages: there is a recent uptick in the number of attempts to gain private information that\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.yardi.com\/blog\/step-up-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Step Up Security\" \/>\n<meta property=\"og:description\" content=\"Perhaps you\u2019ve noticed it in your email inbox or text messages: there is a recent uptick in the number of attempts to gain private information that\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yardi.com\/blog\/step-up-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Yardi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-10T12:53:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-13T21:02:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2022\/04\/rsz_adobestock_351107805.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"867\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leah Etling\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leah Etling\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.yardi.com\/blog\/step-up-security\/\",\"url\":\"https:\/\/www.yardi.com\/blog\/step-up-security\/\",\"name\":\"Step Up Security - Yardi Corporate Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/step-up-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/step-up-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2022\/04\/rsz_adobestock_351107805.jpg\",\"datePublished\":\"2022-04-10T12:53:00+00:00\",\"dateModified\":\"2022-04-13T21:02:55+00:00\",\"author\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/81b16a7aea318dbdaaa0a17b776a0c52\"},\"description\":\"Perhaps you\u2019ve noticed it in your email inbox or text messages: there is a recent uptick in the number of attempts to gain private information that\",\"breadcrumb\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/step-up-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.yardi.com\/blog\/step-up-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yardi.com\/blog\/step-up-security\/#primaryimage\",\"url\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2022\/04\/rsz_adobestock_351107805.jpg\",\"contentUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2022\/04\/rsz_adobestock_351107805.jpg\",\"width\":1000,\"height\":867,\"caption\":\"data phishing hacking online scam concept, with laptop and envelope hook\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.yardi.com\/blog\/step-up-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.yardi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Step Up Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#website\",\"url\":\"https:\/\/www.yardi.com\/blog\/\",\"name\":\"Yardi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.yardi.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/81b16a7aea318dbdaaa0a17b776a0c52\",\"name\":\"Leah Etling\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9fa1e69f4f920593cfa724d25dc7da5cb96fac8a5a1a39b01b0d456d468ed3af?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9fa1e69f4f920593cfa724d25dc7da5cb96fac8a5a1a39b01b0d456d468ed3af?s=96&d=mm&r=g\",\"caption\":\"Leah Etling\"},\"description\":\"Leah Etling is the founding editor of the Balance Sheet and a 12-year Yardi employee who also oversees press releases and social media. An award winning journalist, she holds a master's degree from UC Berkeley and is a native of Santa Barbara County, Yardi's home.\",\"url\":\"https:\/\/www.yardi.com\/blog\/author\/leah-etling\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Yardi Blog","description":"Perhaps you\u2019ve noticed it in your email inbox or text messages: there is a recent uptick in the number of attempts to gain private information that","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.yardi.com\/blog\/step-up-security\/","og_locale":"en_US","og_type":"article","og_title":"Step Up Security","og_description":"Perhaps you\u2019ve noticed it in your email inbox or text messages: there is a recent uptick in the number of attempts to gain private information that","og_url":"https:\/\/www.yardi.com\/blog\/step-up-security\/","og_site_name":"Yardi Blog","article_published_time":"2022-04-10T12:53:00+00:00","article_modified_time":"2022-04-13T21:02:55+00:00","og_image":[{"width":1000,"height":867,"url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2022\/04\/rsz_adobestock_351107805.jpg","type":"image\/jpeg"}],"author":"Leah Etling","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Leah Etling","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.yardi.com\/blog\/step-up-security\/","url":"https:\/\/www.yardi.com\/blog\/step-up-security\/","name":"Step Up Security - Yardi Corporate Blog","isPartOf":{"@id":"https:\/\/www.yardi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.yardi.com\/blog\/step-up-security\/#primaryimage"},"image":{"@id":"https:\/\/www.yardi.com\/blog\/step-up-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2022\/04\/rsz_adobestock_351107805.jpg","datePublished":"2022-04-10T12:53:00+00:00","dateModified":"2022-04-13T21:02:55+00:00","author":{"@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/81b16a7aea318dbdaaa0a17b776a0c52"},"description":"Perhaps you\u2019ve noticed it in your email inbox or text messages: there is a recent uptick in the number of attempts to gain private information that","breadcrumb":{"@id":"https:\/\/www.yardi.com\/blog\/step-up-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yardi.com\/blog\/step-up-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yardi.com\/blog\/step-up-security\/#primaryimage","url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2022\/04\/rsz_adobestock_351107805.jpg","contentUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2022\/04\/rsz_adobestock_351107805.jpg","width":1000,"height":867,"caption":"data phishing hacking online scam concept, with laptop and envelope hook"},{"@type":"BreadcrumbList","@id":"https:\/\/www.yardi.com\/blog\/step-up-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yardi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Step Up Security"}]},{"@type":"WebSite","@id":"https:\/\/www.yardi.com\/blog\/#website","url":"https:\/\/www.yardi.com\/blog\/","name":"Yardi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yardi.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/81b16a7aea318dbdaaa0a17b776a0c52","name":"Leah Etling","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9fa1e69f4f920593cfa724d25dc7da5cb96fac8a5a1a39b01b0d456d468ed3af?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9fa1e69f4f920593cfa724d25dc7da5cb96fac8a5a1a39b01b0d456d468ed3af?s=96&d=mm&r=g","caption":"Leah Etling"},"description":"Leah Etling is the founding editor of the Balance Sheet and a 12-year Yardi employee who also oversees press releases and social media. An award winning journalist, she holds a master's degree from UC Berkeley and is a native of Santa Barbara County, Yardi's home.","url":"https:\/\/www.yardi.com\/blog\/author\/leah-etling\/"}]}},"jetpack_featured_media_url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2022\/04\/rsz_adobestock_351107805.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/31654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/users\/413"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/comments?post=31654"}],"version-history":[{"count":2,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/31654\/revisions"}],"predecessor-version":[{"id":31657,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/31654\/revisions\/31657"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/media\/31656"}],"wp:attachment":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/media?parent=31654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/categories?post=31654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/tags?post=31654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}