{"id":14851,"date":"2023-11-20T01:00:00","date_gmt":"2023-11-20T01:00:00","guid":{"rendered":"https:\/\/businessyield.com\/tech\/?p=14851"},"modified":"2023-11-24T23:37:03","modified_gmt":"2023-11-24T23:37:03","slug":"vishing-what-it-is-how-to-prevent-it","status":"publish","type":"post","link":"https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/","title":{"rendered":"Vishing: What It Is &amp; How To Prevent It","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"\n<p>The term vishing is a portmanteau created from voice and phishing. Most people have heard of \u201cphishing\u201d, which involves enticing email or text messages into clicking on links to files or websites that harbor malware. The links may also appear in online advertisements that target consumers.<\/p>\n\n\n\n<p>Vishing uses verbal scams to trick people into doing things they believe are in their best interests. Vishing often picks up where phishing leaves off. It is typically considered a type of phishing, which itself is a type of social engineering. Vishing is concerned with voice communication, whereas phishing typically relies on email communication. <\/p>\n\n\n\n<p>Vishing attacks are carried out against both individuals and businesses, usually for monetary gain. However, it might also be motivated by other objectives, such as political, competitive or retaliatory activities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-understanding-the-concept-of-vishing\"><span id=\"understanding-the-concept-of-vishing\"><strong>Understanding the concept of vishing<\/strong><\/span><\/h2>\n\n\n\n<p>A vishing attack is\u00a0a type of\u00a0phishing attack\u00a0in which a threat actor uses social engineering tactics via voice communication to scam a target. The scammer may either try to convince a target to send them money or share any or all of the following sensitive information:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Name<\/li>\n\n\n\n<li>Address<\/li>\n\n\n\n<li>Date of birth<\/li>\n\n\n\n<li>Usernames<\/li>\n\n\n\n<li>Passwords<\/li>\n\n\n\n<li>Credit card information<\/li>\n\n\n\n<li>Banking data<\/li>\n\n\n\n<li>Government-issued numbers (e.g. Social Security or Social Insurance)<\/li>\n<\/ul>\n\n\n\n<p>Scammers who carry out vishing campaigns use an assortment of tactics to get their targets to divulge confidential information. They might call their targets directly or leave voice messages, play recorded messages, or speak directly to their targets. They might precede their calls with a text message or employ some other mechanism to bait the prospective victims.<\/p>\n\n\n\n<p>For example, a scammer might send a text message to a potential victim\u2019s phone number, suggesting that there is a problem with the person\u2019s bank account. This is followed by a voicemail message stating that the victim\u2019s bank account experienced suspicious activity and is now locked down. The message then instructs the victim to call a specific telephone number and provide information to \u201cverify the customer\u2019s identity\u201d or to \u201censure that fraud has not occurred.\u201d<\/p>\n\n\n\n<p>Vishing scammers commonly try to instill a sense of urgency or veiled threat when communicating with their victims. They use fear, excitement, greed and other emotional responses to get their victims to reveal confidential information before they have time to consider what they\u2019re doing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Types\"><span id=\"types-of-vishing-attacks\"><strong>Types of vishing attacks<\/strong><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Types<\/strong><\/th><th><strong>Description<\/strong><\/th><\/tr><\/thead><tbody><tr><td><strong>Wardialing<\/strong><\/td><td>In a wardialing type of vishing attack, cybercriminals call specific area codes and use an automated message to instill fear in victims. They pretend to be a local bank, business or police station calling to verify that their accounts have not been compromised and typically ask for sensitive information like mailing address, bank account information, and even social security numbers.<\/td><\/tr><tr><td><strong>VoIP<\/strong><\/td><td>VoIPs are one of the hardest vishing techniques to identify because cybercriminals hide behind a fake number. These numbers are typically 1800 numbers or fake numbers with the local area code.<\/td><\/tr><tr><td><strong>Dumpster Diving<\/strong><\/td><td>Dumpster diving is a technique not many think is used, but it\u2019s exactly as it sounds. With this technique. Criminals search dumpsters behind banks or other important organizations to gather enough information to conduct a targeted attack on a victim. Potential information they can gather includes the type of account information, phone number, or email and proceed with social engineering techniques with the attack.<\/td><\/tr><tr><td><strong>Caller ID Spoofing<\/strong><\/td><td>This type of vishing attack is similar to VoIP, with the difference that the caller id, instead of showing a number, shows the message \u201cIRS\u201d or \u201cPolice Department\u201d.<\/td><\/tr><tr><td><strong>Technical Support<\/strong><\/td><td>Scammers will pretend to be someone from customer support from big companies like Apple, Microsoft, or Bank of America. It is important to remember that banks will never ask you for personal information such as social security numbers over the phone.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 id=\"how-scammers-carry-out-vishing-attacks\" class=\"wp-block-heading\"><strong>How scammers carry out vishing attacks<\/strong><\/h2>\n\n\n\n<p>Today\u2019s technologies make it possible for cybercriminals to conduct massive vishing campaigns. <\/p>\n\n\n\n<p>One of the most important technologies is voice over IP (VoIP), a telecommunications system that uses high-speed\u00a0IP\u00a0networks to facilitate voice exchanges. Although VoIP is used extensively for legitimate business, cybercriminals are also taking ID spoofing advantage of the technology and its many features. With VoIP, they can carry out attacks without being detected, automate much of their operations, hide their locations or even keep moving locations.<\/p>\n\n\n\n<p>Cybercriminals also use caller ID spoofing, the process of manipulating the displayed caller IDs to impersonate a legitimate source, such as a bank or government agency. In addition, they\u2019ve begun to use\u00a0machine learning\u00a0to incorporate voice cloning into their operations. Voice cloning\u00a0is a technique for simulating the voices of people whom their victims might recognize, making targeted attacks far more effective and difficult to detect.<\/p>\n\n\n\n<p>Vishing based on VoIP is extremely difficult for authorities to trace, and when combined with voice cloning, it\u2019s even trickier to stop. Furthermore, cybercriminals often outsource their vishing scams to individuals or organizations in other countries, which can render sovereign law enforcement powerless. <\/p>\n\n\n\n<p>Even if this were not the case, those in other countries are also taking advantage of technologies such as VoIP, adding yet another layer of challenges.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"vishing-attack-examples\"><span id=\"examples-of-vishing-attack\"><strong>Examples of vishing attack<\/strong><\/span><\/h2>\n\n\n\n<p>Most incidents of fraud involve telephone-based communication. Here are some examples of common vishing attacks:<\/p>\n\n\n\n<h3 id=\"banking-scams\" class=\"wp-block-heading\"><strong>Banking scams<\/strong><\/h3>\n\n\n\n<p>Vishing attackers attempt to steal\u00a0financial\u00a0information such as bank accounts and credit card numbers. One method they use to trick their victims is ID spoofing, where they impersonate a legitimate entity using an ID that looks authentic. <\/p>\n\n\n\n<p>For example, a scammer might pose as a CFO or employee in the financial department and try to persuade the target to transfer funds to an offshore account.<\/p>\n\n\n\n<h3 id=\"unsolicited-investment-and-loan-offers\" class=\"wp-block-heading\"><strong>Unsolicited investment and loan offers<\/strong><\/h3>\n\n\n\n<p>Scammers often call their targets offering unrealistically enticing deals, such as quick fixes to pay off debts or get-rich-quick schemes. These offers tend to require immediate action accompanied by a fee. A legitimate lender or investor does not initiate unsolicited contact or make overly optimistic offers.<\/p>\n\n\n\n<h3 id=\"social-security-and-medicare-scams\" class=\"wp-block-heading\"><strong>Social Security and Medicare scams<\/strong><\/h3>\n\n\n\n<p>Phone calls are the preferred method for scamming older targets. Scammers often pose as representatives from Medicare or the Social Security Administration. They may try to steal personal information such as Medicare or Social Security numbers or threaten to suspend or stop benefits. <\/p>\n\n\n\n<p>Scammers can use the stolen information to steal money or redirect benefits.<\/p>\n\n\n\n<h3 id=\"tax-scams\" class=\"wp-block-heading\"><strong>Tax scams<\/strong><\/h3>\n\n\n\n<p>Scammers often send a prerecorded message, ostensibly from the IRS, informing victims of a supposed issue with their tax returns. Spoofed caller IDs often make it look like the call is from the IRS.<\/p>\n\n\n\n<h2 id=\"how-common-is-vishing\" class=\"wp-block-heading\"><strong>How common is vishing<\/strong><\/h2>\n\n\n\n<p>Credit card fraud in 2015 was a $16 billion business globally, and vishing came in at $1 billion, according to\u00a0<a href=\"http:\/\/www.bbc.com\/news\/business-35201188\" target=\"_blank\" rel=\"noreferrer noopener\">the BBC<\/a>. Essentially, vishing can occur anytime perpetrators gain access to victims\u2019 personal information.<\/p>\n\n\n\n<p>Cybercriminals deliberately create conditions designed to con unsuspecting victims into willingly handing over valuable personal details, such as full names, addresses, phone numbers, and credit card numbers.<\/p>\n\n\n\n<p>With that information, cybercriminals can initiate numerous fraudulent charges, starting with fake fees for computer repairs or antivirus software, depending on the scam.<\/p>\n\n\n\n<p>Vishing thrives when cybercriminals have a modicum of information about a user\u2019s interests. They take advantage of this knowledge to create a sense of urgency involving a problem in the victim\u2019s life, and then they step in to save the day by offering a simple solution to the problem in soothing tones.<\/p>\n\n\n\n<h2 id=\"how-to-recognize-vishing\" class=\"wp-block-heading\"><strong>How to recognize vishing<\/strong><\/h2>\n\n\n\n<p>In many cases, callers are self-appointed experts or authorities in their fields. They can masquerade as computer technicians, bankers, police, or even victims themselves.<\/p>\n\n\n\n<p>However, if these callers are legitimate, it shouldn\u2019t be difficult to authenticate their professional affiliation with a simple phone call. If they can\u2019t \u2014 or won\u2019t \u2014 provide the information necessary to verify their identity, they can\u2019t be trusted. If they do provide contact info, it\u2019s still important to independently verify the legitimacy by using an official public phone number to call the organization in question.<\/p>\n\n\n\n<p>Although it\u2019s tempting to give in under pressure, a frantic sense of urgency is a huge red flag. Users should take a couple of deep breaths, and then write down any information the person provides on the call \u2014 without providing any details of their own. Again, they can access third-party sources to find a public phone number to call for verification.<\/p>\n\n\n\n<p>Recipients of these calls also shouldn\u2019t click on links in emails (phishing) or in mobile phone\u00a0SMS text messages\u00a0(SMiShing) the person on the phone might send. Any correspondence is likely to contain \u201chooks\u201d that download malware that could take control of computer systems, steal user credentials, and even spy on users.<\/p>\n\n\n\n<p>If consumers receive unsolicited calls from anyone offering any type of computer service, they shouldn\u2019t attempt to call back using the same phone on which they received the call.<\/p>\n\n\n\n<p>Phone technology now exists that locks a victim\u2019s phone line after hanging up and redirects their next calls to the fraudulent caller. People who believe an issue could be authentic should use another phone to call a publicly acknowledged phone number.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"stop\"><span id=\"how-to-stop-vishing\"><strong>How to stop vishing<\/strong><\/span><\/h2>\n\n\n\n<p>People who fall victim to vishing attacks can be well-informed of the risk, but simply caught off-guard. Threat actors change their tactics regularly to try to fool people in new ways. You may pick up a call during a busy day when the last thing you expect is a vishing attack, or the caller might use information that sounds familiar enough to be convincing. <\/p>\n\n\n\n<p>To stay alert and be ready if you get one of these calls, here are some things to remember:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Pay attention to the caller\u2019s tone<\/strong>. Scammers may also use a discourteous or impatient tone to imply urgency or create fear, unlike the trained employees from the organization they claim to represent.<\/li>\n\n\n\n<li><strong>Stay calm and take a breath<\/strong>. Vishing attackers create a false sense of urgency by exploiting your emotions. Don\u2019t share any sensitive information over the phone without verifying the caller\u2019s identity. You can look their organization up and call them directly.<\/li>\n\n\n\n<li><strong>Keep your guard up even if the caller has some of your information<\/strong>. For example, they may have gathered some of your publicly available data from the Internet, like your name, location, or IP address.<\/li>\n\n\n\n<li><strong>Screen your calls with Caller ID and don\u2019t pick up unknown or suspicious numbers<\/strong>. Wait for the caller to leave you a voice message to decide whether you should call back. Remember, many robocall scams follow a recognizable script.<\/li>\n\n\n\n<li>Exercise caution and simply hang up if you suspect that it\u2019s a scammer.<\/li>\n<\/ul>\n\n\n\n<h3 id=\"mitigating-additional-attack-vectors\" class=\"wp-block-heading\"><strong>Mitigating additional attack vectors<\/strong><\/h3>\n\n\n\n<p>Unlike phishing, vishing is hard to stop using technology. Because vishing takes place over the phone, an organization would need to eavesdrop on all phone calls and find warning signs to detect an attack.<\/p>\n\n\n\n<p>Due to this, organizations should build a threat model and focus on the attacker\u2019s objectives when preventing vishing attacks. For example, a vishing attack targeting an organization may have one of several goals:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Infecting an employee\u2019s computer with malware<\/li>\n\n\n\n<li>Compromising an employee\u2019s access credentials<\/li>\n\n\n\n<li>Gaining access or control over a user\u2019s device<\/li>\n<\/ul>\n\n\n\n<p>By isolating each of these threat scenarios, the organization can implement solutions that stop attackers in the later stages of the attack\u2014even if the initial vishing call remains undetectable.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"difference\"><span id=\"vishing-vs-smishing-vs-phishing\"><strong>Vishing vs.\u00a0smishing vs. phishing<\/strong><\/span><\/h2>\n\n\n\n<p>Vishing, phishing, and\u00a0smishing are all types of attacks that only differ by the threat vectors they employ. Phishing has been around since at least the early days of e-mail, and both vishing and smishing are combinations of the word \u201cphishing\u201d and the communication method used. <\/p>\n\n\n\n<p>Vishing (voice phishing) occurs through voice communication, and smishing (SMS phishing) uses SMS text messages as an attack medium.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-recommended-articles\"><span id=\"recommended-articles\"><strong>Recommended Articles <\/strong><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/smishing-and-phishing-what-is-the-difference\/\">Smishing and Phishing: What Is The Difference?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-a-passphrase-everything-you-need-to-know\/\">What Is A Passphrase? Everything You Need To Know<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/cybersecurity-risk-assessment-what-it-is-how-to-perform-it\/\">Cybersecurity Risk Assessment: What It Is & How To Perform It<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/juice-jacking-what-it-is-how-to-prevent-it\/\">Juice Jacking: What It Is & How To Prevent It<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/spoof-calling-what-is-it-how-do-you-avoid-it\/\">Spoof Calling: What Is It & How Do You Avoid It?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/soc-cybersecurity\/\">SOC Cybersecurity: Security Operations Center (Soc) Explained<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-references\"><span id=\"references\"><strong>References<\/strong><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.techtarget.com\/searchunifiedcommunications\/resources\/Collaboration-and-communication-security\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">TechTarget<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.kaspersky.com\/resource-center\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Kaspersky<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.imperva.com\/learn\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Imperva<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.malwarebytes.com\/cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Malware Bytes<\/a><\/li>\n<\/ul>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"excerpt":{"rendered":"The term vishing is a portmanteau created from voice and phishing. Most people have heard of \u201cphishing\u201d, which&hellip;\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"author":290,"featured_media":14853,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[302],"tags":[],"class_list":{"0":"post-14851","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vishing: What It Is &amp; How To Prevent It - Business Yield Technology<\/title>\n<meta name=\"description\" content=\"Vishing is\u00a0a type of\u00a0phishing attack\u00a0in which a threat actor uses social engineering tactics via voice communication to scam a target.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vishing: What It Is &amp; How To Prevent It - Business Yield Technology\" \/>\n<meta property=\"og:description\" content=\"Vishing is\u00a0a type of\u00a0phishing attack\u00a0in which a threat actor uses social engineering tactics via voice communication to scam a target.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Business Yield Technology\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/Jay.Arnis\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-20T01:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-24T23:37:03+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-4-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jimmy Anisulowo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/forlahjay\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jimmy Anisulowo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/vishing-what-it-is-how-to-prevent-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/vishing-what-it-is-how-to-prevent-it\\\/\"},\"author\":{\"name\":\"Jimmy Anisulowo\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#\\\/schema\\\/person\\\/0f5b3b62b69726a967e6d217a4d242ff\"},\"headline\":\"Vishing: What It Is &amp; How To Prevent It\",\"datePublished\":\"2023-11-20T01:00:00+00:00\",\"dateModified\":\"2023-11-24T23:37:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/vishing-what-it-is-how-to-prevent-it\\\/\"},\"wordCount\":2025,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/vishing-what-it-is-how-to-prevent-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/businessyield.com\\\/tech\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/Untitled-design-4-1.jpg?fit=1000%2C667&ssl=1\",\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/vishing-what-it-is-how-to-prevent-it\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/vishing-what-it-is-how-to-prevent-it\\\/\",\"url\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/vishing-what-it-is-how-to-prevent-it\\\/\",\"name\":\"Vishing: What It Is &amp; How To Prevent It - Business Yield Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/vishing-what-it-is-how-to-prevent-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/vishing-what-it-is-how-to-prevent-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/businessyield.com\\\/tech\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/Untitled-design-4-1.jpg?fit=1000%2C667&ssl=1\",\"datePublished\":\"2023-11-20T01:00:00+00:00\",\"dateModified\":\"2023-11-24T23:37:03+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#\\\/schema\\\/person\\\/0f5b3b62b69726a967e6d217a4d242ff\"},\"description\":\"Vishing is\u00a0a type of\u00a0phishing attack\u00a0in which a threat actor uses social engineering tactics via voice communication to scam a target.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/vishing-what-it-is-how-to-prevent-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/vishing-what-it-is-how-to-prevent-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/vishing-what-it-is-how-to-prevent-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/businessyield.com\\\/tech\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/Untitled-design-4-1.jpg?fit=1000%2C667&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/businessyield.com\\\/tech\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/Untitled-design-4-1.jpg?fit=1000%2C667&ssl=1\",\"width\":1000,\"height\":667,\"caption\":\"Image by rawpixel.com on Freepik\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/vishing-what-it-is-how-to-prevent-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vishing: What It Is &amp; How To Prevent It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#website\",\"url\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/\",\"name\":\"Business Yield Technology\",\"description\":\"Best Tech Reviews, Apps, Phones, &amp; Gaming\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#\\\/schema\\\/person\\\/0f5b3b62b69726a967e6d217a4d242ff\",\"name\":\"Jimmy Anisulowo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g\",\"caption\":\"Jimmy Anisulowo\"},\"description\":\"Jimmy generally lives his life by one dogma: steady improvement. This has taken him on a relentless pursuit of knowledge in diverse fields such as business, tech, insurance, health and many others. With a background in content creation and digital marketing plus over ten years of writing and research experience, he implements an expert's view to help his audiences gain valuable insight. He is also an avid reader, gamer, drummer, full-blown metalhead, and all-round fun gi.\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Jay.Arnis\",\"https:\\\/\\\/www.instagram.com\\\/forlahjay\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/forlahjay\"],\"url\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/author\\\/jimmy\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vishing: What It Is &amp; How To Prevent It - Business Yield Technology","description":"Vishing is\u00a0a type of\u00a0phishing attack\u00a0in which a threat actor uses social engineering tactics via voice communication to scam a target.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/","og_locale":"en_US","og_type":"article","og_title":"Vishing: What It Is &amp; How To Prevent It - Business Yield Technology","og_description":"Vishing is\u00a0a type of\u00a0phishing attack\u00a0in which a threat actor uses social engineering tactics via voice communication to scam a target.","og_url":"https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/","og_site_name":"Business Yield Technology","article_author":"https:\/\/www.facebook.com\/Jay.Arnis","article_published_time":"2023-11-20T01:00:00+00:00","article_modified_time":"2023-11-24T23:37:03+00:00","og_image":[{"width":1000,"height":667,"url":"http:\/\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-4-1.jpg","type":"image\/jpeg"}],"author":"Jimmy Anisulowo","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/forlahjay","twitter_misc":{"Written by":"Jimmy Anisulowo","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/#article","isPartOf":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/"},"author":{"name":"Jimmy Anisulowo","@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff"},"headline":"Vishing: What It Is &amp; How To Prevent It","datePublished":"2023-11-20T01:00:00+00:00","dateModified":"2023-11-24T23:37:03+00:00","mainEntityOfPage":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/"},"wordCount":2025,"commentCount":0,"image":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-4-1.jpg?fit=1000%2C667&ssl=1","articleSection":["Cyber Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/","url":"https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/","name":"Vishing: What It Is &amp; How To Prevent It - Business Yield Technology","isPartOf":{"@id":"https:\/\/businessyield.com\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/#primaryimage"},"image":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-4-1.jpg?fit=1000%2C667&ssl=1","datePublished":"2023-11-20T01:00:00+00:00","dateModified":"2023-11-24T23:37:03+00:00","author":{"@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff"},"description":"Vishing is\u00a0a type of\u00a0phishing attack\u00a0in which a threat actor uses social engineering tactics via voice communication to scam a target.","breadcrumb":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/#primaryimage","url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-4-1.jpg?fit=1000%2C667&ssl=1","contentUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-4-1.jpg?fit=1000%2C667&ssl=1","width":1000,"height":667,"caption":"Image by rawpixel.com on Freepik"},{"@type":"BreadcrumbList","@id":"https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/businessyield.com\/tech\/"},{"@type":"ListItem","position":2,"name":"Vishing: What It Is &amp; How To Prevent It"}]},{"@type":"WebSite","@id":"https:\/\/businessyield.com\/tech\/#website","url":"https:\/\/businessyield.com\/tech\/","name":"Business Yield Technology","description":"Best Tech Reviews, Apps, Phones, &amp; Gaming","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/businessyield.com\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff","name":"Jimmy Anisulowo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g","caption":"Jimmy Anisulowo"},"description":"Jimmy generally lives his life by one dogma: steady improvement. This has taken him on a relentless pursuit of knowledge in diverse fields such as business, tech, insurance, health and many others. With a background in content creation and digital marketing plus over ten years of writing and research experience, he implements an expert's view to help his audiences gain valuable insight. He is also an avid reader, gamer, drummer, full-blown metalhead, and all-round fun gi.","sameAs":["https:\/\/www.facebook.com\/Jay.Arnis","https:\/\/www.instagram.com\/forlahjay\/","https:\/\/x.com\/https:\/\/twitter.com\/forlahjay"],"url":"https:\/\/businessyield.com\/tech\/author\/jimmy\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-4-1.jpg?fit=1000%2C667&ssl=1","jetpack_sharing_enabled":true,"gt_translate_keys":[{"key":"link","format":"url"}],"_links":{"self":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/users\/290"}],"replies":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/comments?post=14851"}],"version-history":[{"count":2,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14851\/revisions"}],"predecessor-version":[{"id":14854,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14851\/revisions\/14854"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/media\/14853"}],"wp:attachment":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/media?parent=14851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/categories?post=14851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/tags?post=14851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}