The 2014 FIFA World Cup in Brazil promises amazing football, frantic fans around the globe, and a playground for fraudsters I just returned from Brazil where the anticipation around the 2014 FIFA World Cup was astounding. Even though Brazil has won the Word Cup several times, this is the first year they’ve hosted since 1950. As with many countries where soccer (“football”) inspires nationalistic pride, promotes escapism or more simply provides the zenith of sports entertainment, most Brazilians have an insatiable hunger. The media, event sponsors and retailers are more than happy to overindulge their appetites. From clothing and restaurants to television and Internet – the World Cup is everywhere.[Experts warn of Russian spying, hackers at Sochi Olympics]The Phishing LandscapeUnderstanding the proclivities of these fans gives criminals an advantage. The World Cup provides a window of opportunity and a tremendous vehicle for online fraud such as phishing. Not only do the targets accept that they will receive a barrage of World Cup-related solicitations, but they often desire said solicitations and are excited to “click.” This “perfect storm” isn’t specific to the World Cup. Phishing scams are often associated with current events such as:Entertainment in the form of movie trailers, awards and celebrity photosSporting events with large, preferably global audiencesNatural disasters, political elections and military actionsViral videos of animals seeing themselves in mirrorsUnfortunately for the targets of phishing, the fraudsters have nefarious ulterior motives. The fraudsters may be interested in identity theft, stealing credentials, stealing financial information, or locking your system and holding it for ransom with malware like “Simplelocker,” which has been dissected and analyzed by my employer Blue Coat in a blog titled: “Simplelocker” Android Ransomware Encrypts Files. Or maybe the fraudsters just want to add your device to their botnet army to be controlled at will. Regardless of their motive, you have something they want. The results of phishing can impact individuals and organizations including depleted bank accounts, credit debt, sensitive/personal data theft, countless hours of negotiation with financial institutions, stress, and the list goes on. The risks to the criminals are low. This is because the likelihood of being apprehended and the severity of the punishment for phishing — and most cybercrimes, depending on the country — are low. Thus legal deterrence is ineffective. Additionally, the complexities of international law and extradition means that criminals can reside and operate in cybercrime-friendly countries, much like pirates in the 17th and 18th centuries that stimulated the economy in Jamaica and provided protection from the Spanish in exchange for a safe haven. Phishing SafeguardsWhile there is no anti-phishing panacea that will mitigate all threats, there are technical and non-technical controls that can reduce the risk of a phishing attack being successful. Here are 15 safeguards to consider. Verify before you click, download and openUse bookmarks instead of clicking on a link, or typing in a URL with potential misspellings; that URL could take you to a malicious siteDon’t respond to emails with your sensitive dataDon’t enter your sensitive data it into a form indiscriminatelyDon’t enter your sensitive data into pop-up windowsUnderstand criminal tactics and if in doubt pick up the phone – criminals will try to create compelling events by stating:Free World Cup…Enter your password or all your cloud data will be corruptedClick here to avoid your Internet service being disconnectedFinal warning – download this anti-malware tool to avoid shutdownYou have five seconds to comply or your bank account will be frozenYour smartphones and tablets are computers too, and the security best practices you apply to traditional computers like laptops should apply to them; before you install that World Cup app do some researchKeep your operating systems and applications patched and up-to-dateUse web filtering software to disallow access to known bad sites; many are freeUse browser phishing protection – common in most modern browsersInstall and update endpoint security controlsAll legitimate websites requesting personal information such as your bank should be encrypting communications; look for “HTTPS” and/or the lock icon in the browser’s URL fieldKeep an eye on your account activity. Many sites provide last login date, location, etc.Use credit activity monitoring services – you likely already have a bunch of free years from getting credit cards stolen in the pastReport suspicious activity (IT dept., ISP, FTC) and opt in to share threat intelligence via your security solutions – use the crowd as a force multiplierWith events like the World Cup where information is flooding our laptops, tablets and smartphones from all directions, it is important not to get so caught up in the moment that we forget the criminals are working overtime. By considering these 15 safeguards and successfully mitigating phishing attacks, you’re negatively impacting the criminal revenue stream and making this type of fraud less appealing. Related content opinion Congrats - you’re the new CISO…now what You need foundational visibility into your security posture regarding what’s working and what’s not. By Brian Contos Mar 06, 2017 5 mins Technology Industry IT Strategy Cybercrime opinion Before you buy another cybersecurity buzzword Get value from what you’ve got before buying something new. Get rid of solutions that no longer add value and acquire new ones that are really needed with confidence. By Brian Contos Feb 21, 2017 2 mins RSA Conference IT Skills Network Security opinion What some cybersecurity vendors don’t want you to know When evaluating security products, you might be doing it wrong if you’re not incorporating assurance testing. By Brian Contos Feb 08, 2017 4 mins Technology Industry IT Skills Security opinion What football teaches us about cybersecurity You wouldn’t expect a football team that never practices to win the Super Bowl; but we expect wins every day from our cybersecurity professionals. By Brian Contos Feb 01, 2017 6 mins Technology Industry IT Jobs IT Skills Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe