Get to Know Phishing, and How to Avoid It

Mengenal Phising

Get to Know Phishing – Cyber crime often occurs in the midst of internet user communities, especially in Indonesia. The police are also trying to crack down on this cyber crime by forming a special cyber team. There are many types of cyber crimes such as phishing, carding, DoS, Sql Injection, Malware, and many more.

Before reading further, for those of you who are interested in our services, you can contact us directly by clicking the link below.

Consultation Via Whatsapp ” letter_case=”lowercase” color=”success” icon=”icon-checkmark” link=”″ target=”_blank”]

Each of these cyber crime activities will certainly be very detrimental to the victims, these victims will suffer losses both financially and wasted time to be able to return the stolen data. One of them that we will discuss this time is phishing, so let’s get to know phishing and how to avoid it? Let’s look at the following explanation.

What is Phishing

The meaning of phishing is an attempt to steal data by hackers by tricking other people. So that the other person unknowingly becomes a victim and hands over their data to the hacker. The value of the stolen data can be very valuable, ranging from personal data, social media account data, to financial data such as credit card information from the victim.

The word phishing comes from the word fishing which means fishing. By analogy, this phishing activity aims to lure people to voluntarily provide personal information without realizing it.

Why doesn’t the victim realize that he is handing over his personal data to other people? Phishing perpetrators make themselves look like the authorities. By using a fake website and e-mail address, he tries to convince the victim to enter data on a website that the victim thinks is genuine. So indirectly the victim is deceived and used by the perpetrator.

According to reports that 32% of data theft consists of phishing activities. In 2020 only

Phishing type

As for the 4 types of phishing that we need to know, let’s study the types of phishing below.

Phishing Emails

As the name suggests, phishing emails use email media to deceive victims by sending emails containing phishing links to direct victims. According to phishing data using e-mail, there have been 3.4 billion fake e-mails sent every day. Imagine if only one percent how many people were victims of this criminal activity.

Web Phishing

This phishing web is a type of phishing that displays a website like a website that looks like the original to deceive the victim. This phishing website looks like an official website and uses a similar domain name. This can also be called spoofing.

For example, there is a website that resembles the social media login page, the domain used for phishing uses the domain or other.


Whaling is a type of phishing that not only targets specific individuals but also targets individuals with high authority within an organization such as business owners, directors, managers and others.

If the whaling action is successful, there are many advantages for the phisis who can take advantage of the access they get.

Spear Phishing

Spear phishing is part of a phishing email. Instead of sending lots of emails and targeting random victims. Spear phishing only targets certain people, usually after obtaining basic information such as the victim’s name and address.

Phishing Characteristics You Must Know

Phishing is a type of cyber crime that can harm the victim financially and the reputation of the victim. But we as ordinary people would be nice to know the characteristics of phishing itself such as:

URL Links in Emails are Too Short and Foreign

The first phishing traits are links that are too short and unfamiliar. Phishing actors usually only use free links because they don’t have to bother thinking about security. Therefore they usually choose links with only 4 to 8 characters.

Apart from being short, the url link used does not contain the name of the official institution. Before being given, there are usually lots of texts or narratives with the lure of gifts or money to attract the attention of the victim.

Bad Spelling Or Grammar

In addition to unclear links, phishing characteristics can also be seen from unclear spelling and grammar. There are some cases of phishing that don’t use punctuation at all or even language that can’t be read at all.

Unknown Email Address

The email address of the person sending the phishing email is usually unknown to the victim and unfamiliar, for example —– and the like.

Website Issues Warning When Clicked

Usually a browser that has strong protection will prevent phishing by giving a warning not to access the website.

Website Template Similar to Official Site

One of the characteristics of deceptive phishing is a website acting in the name of an official site, with a design similar to the information inside is suspicious.

How to Avoid Phishing

After we know the characteristics of phishing above, we will discuss how to avoid phishing below.

Beware of Receiving Unknown Calls

If someone calls from a number we don’t know, we shouldn’t take it for granted. Even though we accept it, we should listen to the person what his interests are. When it comes to matters of privacy or money then we should just ignore it.

Install Phishing Protection App

To be even more secure, we can install various phishing protection applications that can be installed on computers or smartphones.

Store Login Information with Care

Do not distort or leave login information anywhere, such as on an internet cafe’s computer, or on someone else’s cell phone. And you should use a password that is not easy to guess, if it’s hard to remember then you can write it in a personal note.

Accessing Websites with SSL

SSL or Secure Socket Layer is a protective protocol that is installed on websites so that access can be protected online. To avoid phishing, you can make sure whether the website has SSL or not, that’s where you have to know phishing, if not, then you should leave the website.

Routinely Check Gadget Security

Phishing crimes can target all applications in gadgets including mobile banking applications. If you are someone who likes to store information on your gadget, you should make sure that there are no suspicious applications or files, and you must learn how to recognize Phishing properly.

Not Following Suspicious Email/Text Message Instructions

Often, if you receive a suspicious message or email, never follow the instructions from the email.

It’s not easy to be tempted by gifts offered by e-mails/text messages

If you receive a suspicious email or text message, you should delete the message immediately and not be tempted by the lure of the prizes being offered.

If you are interested in our service offerings, please contact us via this link or you can also use our contact form here.


Leave a Reply

Your email address will not be published. Required fields are marked *

Semua operasional PT. Network Data Sistem akan menggunakan domain per tanggal 8 Mei 2019. Semua informasi/promosi dalam bentuk apapun selain menggunakan domain bukan tanggung jawab PT. Network Data Sistem Dismiss