Deprecated: ElementorProDeps\DI\create(): Implicitly marking parameter $className as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/vendor_prefixed/php-di/php-di/src/functions.php on line 32

Deprecated: ElementorProDeps\DI\autowire(): Implicitly marking parameter $className as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/vendor_prefixed/php-di/php-di/src/functions.php on line 44

Deprecated: YoastSEO_Vendor\Symfony\Component\DependencyInjection\Container::__construct(): Implicitly marking parameter $parameterBag as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/wordpress-seo/vendor_prefixed/symfony/dependency-injection/Container.php on line 60

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-basic-authentication domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/molagroup/public_html/molaprise.com/uat/wp-includes/functions.php on line 6121

Deprecated: ElementorProDeps\DI\ContainerBuilder::writeProxiesToFile(): Implicitly marking parameter $proxyDirectory as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/vendor_prefixed/php-di/php-di/src/ContainerBuilder.php on line 231

Deprecated: ElementorProDeps\DI\Definition\Source\ReflectionBasedAutowiring::autowire(): Implicitly marking parameter $definition as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/vendor_prefixed/php-di/php-di/src/Definition/Source/ReflectionBasedAutowiring.php on line 17

Deprecated: ElementorProDeps\DI\Definition\Source\Autowiring::autowire(): Implicitly marking parameter $definition as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/vendor_prefixed/php-di/php-di/src/Definition/Source/Autowiring.php on line 21

Deprecated: ElementorProDeps\DI\Definition\Source\DefinitionFile::__construct(): Implicitly marking parameter $autowiring as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/vendor_prefixed/php-di/php-di/src/Definition/Source/DefinitionFile.php on line 25

Deprecated: ElementorProDeps\DI\Definition\Source\DefinitionArray::__construct(): Implicitly marking parameter $autowiring as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/vendor_prefixed/php-di/php-di/src/Definition/Source/DefinitionArray.php on line 33

Deprecated: ElementorProDeps\DI\Definition\Source\DefinitionNormalizer::normalizeRootDefinition(): Implicitly marking parameter $wildcardsReplacements as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/vendor_prefixed/php-di/php-di/src/Definition/Source/DefinitionNormalizer.php on line 42

Deprecated: ElementorProDeps\DI\Proxy\ProxyFactory::__construct(): Implicitly marking parameter $proxyDirectory as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/vendor_prefixed/php-di/php-di/src/Proxy/ProxyFactory.php on line 38

Deprecated: ElementorProDeps\DI\Container::__construct(): Implicitly marking parameter $definitionSource as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/vendor_prefixed/php-di/php-di/src/Container.php on line 87

Deprecated: ElementorProDeps\DI\Container::__construct(): Implicitly marking parameter $proxyFactory as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/vendor_prefixed/php-di/php-di/src/Container.php on line 87

Deprecated: ElementorProDeps\DI\Container::__construct(): Implicitly marking parameter $wrapperContainer as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/vendor_prefixed/php-di/php-di/src/Container.php on line 87

Deprecated: ElementorProDeps\DI\Definition\ObjectDefinition::__construct(): Implicitly marking parameter $className as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/vendor_prefixed/php-di/php-di/src/Definition/ObjectDefinition.php on line 62

Deprecated: ElementorProDeps\DI\Definition\ObjectDefinition::setClassName(): Implicitly marking parameter $className as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/vendor_prefixed/php-di/php-di/src/Definition/ObjectDefinition.php on line 75

Deprecated: ElementorProDeps\DI\Definition\ObjectDefinition::setLazy(): Implicitly marking parameter $lazy as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/vendor_prefixed/php-di/php-di/src/Definition/ObjectDefinition.php on line 158

Deprecated: ElementorProDeps\DI\Definition\Resolver\ObjectCreator::setPrivatePropertyValue(): Implicitly marking parameter $className as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/vendor_prefixed/php-di/php-di/src/Definition/Resolver/ObjectCreator.php on line 158

Deprecated: ElementorProDeps\DI\Definition\Resolver\ParameterResolver::resolveParameters(): Implicitly marking parameter $definition as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/vendor_prefixed/php-di/php-di/src/Definition/Resolver/ParameterResolver.php on line 34

Deprecated: ElementorProDeps\DI\Definition\Resolver\ParameterResolver::resolveParameters(): Implicitly marking parameter $method as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/vendor_prefixed/php-di/php-di/src/Definition/Resolver/ParameterResolver.php on line 34

Deprecated: ElementorPro\Modules\Forms\Submissions\Actions\Save_To_Database::save_action_log(): Implicitly marking parameter $exception as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/modules/forms/submissions/actions/save-to-database.php on line 159

Deprecated: {closure:ElementorPro\Modules\Forms\Submissions\Actions\Save_To_Database::__construct():193}(): Implicitly marking parameter $exception as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/elementor-pro/modules/forms/submissions/actions/save-to-database.php on line 193

Deprecated: YoastSEO_Vendor\League\OAuth2\Client\Provider\AbstractProvider::authorize(): Implicitly marking parameter $redirectHandler as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/wordpress-seo/vendor_prefixed/league/oauth2-client/src/Provider/AbstractProvider.php on line 416

Deprecated: YoastSEO_Vendor\GuzzleHttp\Client::getConfig(): Implicitly marking parameter $option as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/wordpress-seo/vendor_prefixed/guzzlehttp/guzzle/src/Client.php on line 181

Deprecated: YoastSEO_Vendor\GuzzleHttp\ClientInterface::getConfig(): Implicitly marking parameter $option as nullable is deprecated, the explicit nullable type must be used instead in /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/wordpress-seo/vendor_prefixed/guzzlehttp/guzzle/src/ClientInterface.php on line 77

Warning: Cannot modify header information - headers already sent by (output started at /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/cloudflare/vendor/composer/ClassLoader.php:444) in /home/molagroup/public_html/molaprise.com/uat/wp-includes/rest-api/class-wp-rest-server.php on line 1896

Warning: Cannot modify header information - headers already sent by (output started at /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/cloudflare/vendor/composer/ClassLoader.php:444) in /home/molagroup/public_html/molaprise.com/uat/wp-includes/rest-api/class-wp-rest-server.php on line 1896

Warning: Cannot modify header information - headers already sent by (output started at /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/cloudflare/vendor/composer/ClassLoader.php:444) in /home/molagroup/public_html/molaprise.com/uat/wp-includes/rest-api/class-wp-rest-server.php on line 1896

Warning: Cannot modify header information - headers already sent by (output started at /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/cloudflare/vendor/composer/ClassLoader.php:444) in /home/molagroup/public_html/molaprise.com/uat/wp-includes/rest-api/class-wp-rest-server.php on line 1896

Warning: Cannot modify header information - headers already sent by (output started at /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/cloudflare/vendor/composer/ClassLoader.php:444) in /home/molagroup/public_html/molaprise.com/uat/wp-includes/rest-api/class-wp-rest-server.php on line 1896

Warning: Cannot modify header information - headers already sent by (output started at /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/cloudflare/vendor/composer/ClassLoader.php:444) in /home/molagroup/public_html/molaprise.com/uat/wp-includes/rest-api/class-wp-rest-server.php on line 1896

Warning: Cannot modify header information - headers already sent by (output started at /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/cloudflare/vendor/composer/ClassLoader.php:444) in /home/molagroup/public_html/molaprise.com/uat/wp-includes/rest-api/class-wp-rest-server.php on line 1896

Warning: Cannot modify header information - headers already sent by (output started at /home/molagroup/public_html/molaprise.com/uat/wp-content/plugins/cloudflare/vendor/composer/ClassLoader.php:444) in /home/molagroup/public_html/molaprise.com/uat/wp-includes/rest-api/class-wp-rest-server.php on line 1896
{"id":2767,"date":"2024-08-02T12:36:37","date_gmt":"2024-08-02T12:36:37","guid":{"rendered":"https:\/\/molaprise.com\/uat\/?p=2767"},"modified":"2024-08-02T14:29:32","modified_gmt":"2024-08-02T14:29:32","slug":"think-before-you-click-the-school-of-phishing","status":"publish","type":"post","link":"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/","title":{"rendered":"Think Before You Click: Identifying Phishing 101\u00a0"},"content":{"rendered":"\n

If you haven’t been socially engineered at least once, you might have been and just didn\u2019t realize it. <\/p>\n\n\n\n

Social Engineering<\/a> is a manipulation tactic used to trick targets into performing specific actions or divulging sensitive information. <\/p>\n\n\n\n

Rather than targeting technological vulnerabilities or using brute force attacks, this technique targets YOU \u2013 the human element. <\/p>\n\n\n\n

A harmless click can lead to a digital disaster. That\u2019s why we\u2019re focusing on increasing awareness about social engineering, starting with its most common form: phishing.\u00a0<\/p>\n\n\n\n

Phishing<\/strong> is a tactic for stealing an individual\u2019s personal information like IDs or passwords, or for installing malware which can be used for various purposes including ransomware attacks.  <\/p>\n\n\n\n

83% of organizations fall victim to at least one phishing attack yearly<\/a>, with the human element contributing to 68% of these breaches. <\/em><\/p>\n\n\n\n

The Multiverse of Phishing Variants<\/strong><\/h2>\n\n\n\n

Phishing attacks often employ spoofing<\/a> to appear credible and are easier to avoid when you know how to spot them.<\/p>\n\n\n\n

\n
\n

Email Phishing<\/strong><\/p>\n<\/div>\n\n\n\n

\n

According to the 2024 Verizon Data Breach Incident Report<\/a>, email is the method of choice for delivering 98% of malware. These emails make you want to take actions such as updating your logins or clicking on an attachment\/link.  <\/p>\n<\/div>\n<\/div>\n\n\n\n

\n
\n

Sms Phishing (Smishing)<\/strong><\/strong><\/p>\n<\/div>\n\n\n\n

\n

This is a sophisticated phishing tactic delivered via text messages<\/a>. They seem to come from reputable businesses and could include a web link or prompt you to respond via a fraudulent email or phone number.  <\/p>\n<\/div>\n<\/div>\n\n\n\n

\n
\n

Voice Phis<\/strong><\/strong>hing (Vishing)<\/strong> <\/p>\n<\/div>\n\n\n\n

\n

Scammers leave \u201curgent\u201d messages in calls or voicemails to convince recipients that they stand to miss out on certain opportunities if they don\u2019t respond immediately. This pressure tactic tricks the victim into disclosing personal details, such as passwords or account numbers.  <\/p>\n<\/div>\n<\/div>\n\n\n\n

\n
\n

Angler phishing<\/strong><\/p>\n<\/div>\n\n\n\n

\n

In angler phishing, cybercriminals create fake accounts or hijack legitimate ones to impersonate trusted entities. They use these fake profiles to engage with users, often on social media, to obtain personal information. <\/p>\n<\/div>\n<\/div>\n\n\n\n

\n
\n

Pop-up Phishing<\/strong><\/strong><\/p>\n<\/div>\n\n\n\n

\n

If you\u2019ve ever browsed a site and encountered a pop-up window claiming to warn you about a security issue with your computer, you\u2019ve experienced pop-up phishing. These deceptive pop-ups often prompt you to download what appears to be a legitimate tool, such as an antivirus application, which is actually malware.<\/p>\n<\/div>\n<\/div>\n\n\n\n

\n
\n

Search Engine Phishing<\/strong><\/strong><\/strong><\/p>\n<\/div>\n\n\n\n

\n

They appear as either fake websites that rank high in search engine results or paid search ads leading users to phishing sites. <\/p>\n<\/div>\n<\/div>\n\n\n\n

\n
\n

Evil Twin Hotspots<\/strong><\/strong><\/strong><\/strong><\/p>\n<\/div>\n\n\n\n

\n

Free wi-fi lovers listen up. Hackers can create fake Wi-Fi access points that mimic legitimate networks to trick users into connecting to it. Once you connect to this spoofed network, all your data is routed through a server controlled by the attacker. This leaves your online activity, accounts, and personal information in the open.<\/p>\n<\/div>\n<\/div>\n\n\n\n

Protecting Yourself From Phishing Scams<\/strong><\/h2>\n\n\n\n
\n
\n
    \n
  • Avoid unknown senders. Check names and email addresses before responding. <\/li>\n\n\n\n
  • Don\u2019t trust links or attachments in unsolicited emails. <\/li>\n\n\n\n
  • Beware of messages with mistakes in spelling or grammar. <\/li>\n\n\n\n
  • Be wary of too good to be true \u201cdeals\u201d or emails marked “urgent”.<\/li>\n\n\n\n
  • Track the latest phishing attacks with advanced phishing protection<\/li>\n<\/ul>\n<\/div>\n\n\n\n
    \n
      \n
    • Never give out personal or financial information based on an email request. <\/li>\n\n\n\n
    • When receiving email from known institutions, go directly to the source instead of clicking on links in the email. <\/li>\n\n\n\n
    • Be wary of generic greetings, such as dear sir or ma\u2019am. <\/li>\n\n\n\n
    • Protect your credentials <\/li>\n\n\n\n
    • Use Multi Factor Authentication or a password manager <\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"

      If you haven’t been socially engineered at least once, you might have been and just didn\u2019t realize it.  Social Engineering is a manipulation tactic used to trick targets into performing specific actions or divulging sensitive information.  Rather than targeting technological vulnerabilities or using brute force attacks, this technique targets YOU \u2013 the human element.  A […]<\/p>\n","protected":false},"author":5,"featured_media":2768,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2],"tags":[13,56,57],"class_list":["post-2767","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cybersecurity","tag-data-security","tag-threat-awareness"],"yoast_head":"\nThink Before You Click: Identifying Phishing 101\u00a0 - Molaprise<\/title>\n<meta name=\"description\" content=\"Rather than targeting technological vulnerabilities or using brute force attacks, Social engineering tactics target YOU \u2013 the human element.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Think Before You Click: Identifying Phishing 101\u00a0 - Molaprise\" \/>\n<meta property=\"og:description\" content=\"Rather than targeting technological vulnerabilities or using brute force attacks, Social engineering tactics target YOU \u2013 the human element.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Molaprise\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-02T12:36:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-02T14:29:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/molaprise.com\/uat\/wp-content\/uploads\/2024\/08\/Phishing-cover-photo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Joana Banne\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joana Banne\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/\"},\"author\":{\"name\":\"Joana Banne\",\"@id\":\"https:\/\/molaprise.com\/uat\/#\/schema\/person\/0c602ec3a0c83f6b4f02ec220747a3df\"},\"headline\":\"Think Before You Click: Identifying Phishing 101\u00a0\",\"datePublished\":\"2024-08-02T12:36:37+00:00\",\"dateModified\":\"2024-08-02T14:29:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/\"},\"wordCount\":589,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/molaprise.com\/uat\/#organization\"},\"image\":{\"@id\":\"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/molaprise.com\/uat\/wp-content\/uploads\/2024\/08\/Phishing-cover-photo.jpg\",\"keywords\":[\"Cybersecurity\",\"Data Security\",\"Threat awareness\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/\",\"url\":\"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/\",\"name\":\"Think Before You Click: Identifying Phishing 101\u00a0 - Molaprise\",\"isPartOf\":{\"@id\":\"https:\/\/molaprise.com\/uat\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/molaprise.com\/uat\/wp-content\/uploads\/2024\/08\/Phishing-cover-photo.jpg\",\"datePublished\":\"2024-08-02T12:36:37+00:00\",\"dateModified\":\"2024-08-02T14:29:32+00:00\",\"description\":\"Rather than targeting technological vulnerabilities or using brute force attacks, Social engineering tactics target YOU \u2013 the human element.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/#primaryimage\",\"url\":\"https:\/\/molaprise.com\/uat\/wp-content\/uploads\/2024\/08\/Phishing-cover-photo.jpg\",\"contentUrl\":\"https:\/\/molaprise.com\/uat\/wp-content\/uploads\/2024\/08\/Phishing-cover-photo.jpg\",\"width\":1024,\"height\":535,\"caption\":\"Word - Phishing- surrounded by 0's and 1's\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/molaprise.com\/uat\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Think Before You Click: Identifying Phishing 101\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/molaprise.com\/uat\/#website\",\"url\":\"https:\/\/molaprise.com\/uat\/\",\"name\":\"Molaprise\",\"description\":\"Delivering NextGen Solutions\",\"publisher\":{\"@id\":\"https:\/\/molaprise.com\/uat\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/molaprise.com\/uat\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/molaprise.com\/uat\/#organization\",\"name\":\"Molaprise\",\"url\":\"https:\/\/molaprise.com\/uat\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/molaprise.com\/uat\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/molaprise.com\/uat\/wp-content\/uploads\/2024\/02\/Molaprise-Small-Transparent-01-1.png\",\"contentUrl\":\"https:\/\/molaprise.com\/uat\/wp-content\/uploads\/2024\/02\/Molaprise-Small-Transparent-01-1.png\",\"width\":500,\"height\":89,\"caption\":\"Molaprise\"},\"image\":{\"@id\":\"https:\/\/molaprise.com\/uat\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/molaprise.com\/uat\/#\/schema\/person\/0c602ec3a0c83f6b4f02ec220747a3df\",\"name\":\"Joana Banne\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/molaprise.com\/uat\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/771c8e70825076d45a1fc7f5a07ffbacc6d255def81c4a6e6c65fcf435083201?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/771c8e70825076d45a1fc7f5a07ffbacc6d255def81c4a6e6c65fcf435083201?s=96&d=mm&r=g\",\"caption\":\"Joana Banne\"},\"url\":\"https:\/\/molaprise.com\/uat\/author\/joana\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Think Before You Click: Identifying Phishing 101\u00a0 - Molaprise","description":"Rather than targeting technological vulnerabilities or using brute force attacks, Social engineering tactics target YOU \u2013 the human element.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/","og_locale":"en_US","og_type":"article","og_title":"Think Before You Click: Identifying Phishing 101\u00a0 - Molaprise","og_description":"Rather than targeting technological vulnerabilities or using brute force attacks, Social engineering tactics target YOU \u2013 the human element.\u00a0","og_url":"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/","og_site_name":"Molaprise","article_published_time":"2024-08-02T12:36:37+00:00","article_modified_time":"2024-08-02T14:29:32+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/molaprise.com\/uat\/wp-content\/uploads\/2024\/08\/Phishing-cover-photo.jpg","type":"image\/jpeg"}],"author":"Joana Banne","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Joana Banne","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/#article","isPartOf":{"@id":"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/"},"author":{"name":"Joana Banne","@id":"https:\/\/molaprise.com\/uat\/#\/schema\/person\/0c602ec3a0c83f6b4f02ec220747a3df"},"headline":"Think Before You Click: Identifying Phishing 101\u00a0","datePublished":"2024-08-02T12:36:37+00:00","dateModified":"2024-08-02T14:29:32+00:00","mainEntityOfPage":{"@id":"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/"},"wordCount":589,"commentCount":0,"publisher":{"@id":"https:\/\/molaprise.com\/uat\/#organization"},"image":{"@id":"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/molaprise.com\/uat\/wp-content\/uploads\/2024\/08\/Phishing-cover-photo.jpg","keywords":["Cybersecurity","Data Security","Threat awareness"],"articleSection":["Blog"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/","url":"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/","name":"Think Before You Click: Identifying Phishing 101\u00a0 - Molaprise","isPartOf":{"@id":"https:\/\/molaprise.com\/uat\/#website"},"primaryImageOfPage":{"@id":"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/#primaryimage"},"image":{"@id":"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/molaprise.com\/uat\/wp-content\/uploads\/2024\/08\/Phishing-cover-photo.jpg","datePublished":"2024-08-02T12:36:37+00:00","dateModified":"2024-08-02T14:29:32+00:00","description":"Rather than targeting technological vulnerabilities or using brute force attacks, Social engineering tactics target YOU \u2013 the human element.\u00a0","breadcrumb":{"@id":"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/#primaryimage","url":"https:\/\/molaprise.com\/uat\/wp-content\/uploads\/2024\/08\/Phishing-cover-photo.jpg","contentUrl":"https:\/\/molaprise.com\/uat\/wp-content\/uploads\/2024\/08\/Phishing-cover-photo.jpg","width":1024,"height":535,"caption":"Word - Phishing- surrounded by 0's and 1's"},{"@type":"BreadcrumbList","@id":"https:\/\/molaprise.com\/uat\/blog\/think-before-you-click-the-school-of-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/molaprise.com\/uat\/"},{"@type":"ListItem","position":2,"name":"Think Before You Click: Identifying Phishing 101\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/molaprise.com\/uat\/#website","url":"https:\/\/molaprise.com\/uat\/","name":"Molaprise","description":"Delivering NextGen Solutions","publisher":{"@id":"https:\/\/molaprise.com\/uat\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/molaprise.com\/uat\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/molaprise.com\/uat\/#organization","name":"Molaprise","url":"https:\/\/molaprise.com\/uat\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/molaprise.com\/uat\/#\/schema\/logo\/image\/","url":"https:\/\/molaprise.com\/uat\/wp-content\/uploads\/2024\/02\/Molaprise-Small-Transparent-01-1.png","contentUrl":"https:\/\/molaprise.com\/uat\/wp-content\/uploads\/2024\/02\/Molaprise-Small-Transparent-01-1.png","width":500,"height":89,"caption":"Molaprise"},"image":{"@id":"https:\/\/molaprise.com\/uat\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/molaprise.com\/uat\/#\/schema\/person\/0c602ec3a0c83f6b4f02ec220747a3df","name":"Joana Banne","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/molaprise.com\/uat\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/771c8e70825076d45a1fc7f5a07ffbacc6d255def81c4a6e6c65fcf435083201?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/771c8e70825076d45a1fc7f5a07ffbacc6d255def81c4a6e6c65fcf435083201?s=96&d=mm&r=g","caption":"Joana Banne"},"url":"https:\/\/molaprise.com\/uat\/author\/joana\/"}]}},"jetpack_featured_media_url":"https:\/\/molaprise.com\/uat\/wp-content\/uploads\/2024\/08\/Phishing-cover-photo.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/molaprise.com\/uat\/wp-json\/wp\/v2\/posts\/2767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/molaprise.com\/uat\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/molaprise.com\/uat\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/molaprise.com\/uat\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/molaprise.com\/uat\/wp-json\/wp\/v2\/comments?post=2767"}],"version-history":[{"count":4,"href":"https:\/\/molaprise.com\/uat\/wp-json\/wp\/v2\/posts\/2767\/revisions"}],"predecessor-version":[{"id":2773,"href":"https:\/\/molaprise.com\/uat\/wp-json\/wp\/v2\/posts\/2767\/revisions\/2773"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/molaprise.com\/uat\/wp-json\/wp\/v2\/media\/2768"}],"wp:attachment":[{"href":"https:\/\/molaprise.com\/uat\/wp-json\/wp\/v2\/media?parent=2767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/molaprise.com\/uat\/wp-json\/wp\/v2\/categories?post=2767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/molaprise.com\/uat\/wp-json\/wp\/v2\/tags?post=2767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}