LinkedIn Data Service

 Thanks to easy access to personal

information harvested through public forums or purchased on the dark web, they are well-armed with enough material to provide a convincing front. In many cases they start with a series of benign calls to a targeted associate in order to establish a rapport and gain trust prior to requesting, for instance, a transfer of funds or password reset.

 

 We’d like to think that such deception

is only successful when perpetrated on the naïve LinkedIn Database or unsophisticated. But this assumption is belied by the facts, as some of the world’s most respected

brands, including Robinhood,

Twitter, Cisco, Uber, and Twilio, have all suffered  breaches enabled through vishing intrusions. With vishing incidents seeing a % increase in the past year alone, it is no surprise that % of companies, according to a May survey by Agari and Phishlabs, admit they, too, have been targeted.

 THE QUESTION NOW IS WHAT C

AN BE DONE…NO ONE FORM OF DEFENSE Myth Busted: 888 Isn’t an Area Code (But Here’s Why … WILL BE EFFECTIVE AGAINST SUCH AN AMORPHOUS ENEMY. And let’s not forget that even if an attempted scammer or visher is unsuccessful, they have still taken an agent away from providing service to the callers who matter and contribute to the degradation of your KPI metrics.

 

 Tools of Detection The question no

w is what can be done? And the answer is multi-faceted, as no one form of defense will be effective against such an amorphous adversary. While it’s

Leave a comment

Your email address will not be published. Required fields are marked *