Thanks to easy access to personal
information harvested through public forums or purchased on the dark web, they are well-armed with enough material to provide a convincing front. In many cases they start with a series of benign calls to a targeted associate in order to establish a rapport and gain trust prior to requesting, for instance, a transfer of funds or password reset.
We’d like to think that such deception
is only successful when perpetrated on the naïve LinkedIn Database or unsophisticated. But this assumption is belied by the facts, as some of the world’s most respected
brands, including Robinhood,
Twitter, Cisco, Uber, and Twilio, have all suffered breaches enabled through vishing intrusions. With vishing incidents seeing a % increase in the past year alone, it is no surprise that % of companies, according to a May survey by Agari and Phishlabs, admit they, too, have been targeted.
THE QUESTION NOW IS WHAT C
AN BE DONE…NO ONE FORM OF DEFENSE Myth Busted: 888 Isn’t an Area Code (But Here’s Why … WILL BE EFFECTIVE AGAINST SUCH AN AMORPHOUS ENEMY. And let’s not forget that even if an attempted scammer or visher is unsuccessful, they have still taken an agent away from providing service to the callers who matter and contribute to the degradation of your KPI metrics.
Tools of Detection The question no
w is what can be done? And the answer is multi-faceted, as no one form of defense will be effective against such an amorphous adversary. While it’s