Search
Close this search box.

City of Niceville sees rise in phishing attempts over the past month

The City of Niceville has seen an uptick in cases of phishing and social engineering attacks over the past month. These attacks can come in the form of text messages, emails, instant messaging, and social media direct messaging. These emails and links are designed to steal data from individuals such as usernames and passwords. Additionally, […]

The City of Niceville has seen an uptick in cases of phishing and social engineering attacks over the past month.

  • These attacks can come in the form of text messages, emails, instant messaging, and social media direct messaging.

These emails and links are designed to steal data from individuals such as usernames and passwords. Additionally, they can be the gateway to fraud, identity theft, and theft of monetary values or items such as credit cards or bank account information.

When it comes to attacks against businesses or companies (or a municipality like Niceville), employees can be exploited to gain access past security systems and firewalls. This establishes a foothold as part of a larger attack into such systems, which allows the attackers to gain sensitive information more easily.

“Businesses are constantly under attack from phishing, and so are individuals,” said Jason Monroe, Bit-Wizards. “How often have you opened your email with messages that look legit and want you to click a link to submit further information? This is the simplest form of phishing.”

According to Monroe, phishing really isn’t an attack but is a setup for the actual cyberattack.

“Once the cyber-criminal has the information they need from an unsuspecting employee, they may be able to gain entry into your network or systems and cause untold amounts of chaos,” he said.

So far, all of the attacks have been caught by Niceville’s network security, but as an employee, or even a citizen, there are ways to be protected against these attacks. It’s important to first understand what to look for. Suspicious emails can be detected by noticing what looks off or wrong in a typical email.

  • A guide from Bit-Wizards shows how you can stay safe and aware.

Join the conversation...

Continue reading 👇

Community Comments

“Very glad to see this project going through,we don’t live here but we brought our bikes here from misssouri and drove over to 30A to ride”
Respond
“I suggest revising this statement: "doubling the number of travel lanes from the current four to six" since doubling four does not yield six.”
Respond
“No there was never one here.”
Respond
“Sad that I know him and had no idea!”
Respond
“One of the most important issue regarding this matter is: was this x-con provided with an opportunity to learn a trade while locked up for 327 months or was he...”
Respond
“Whatever happened to innocent until proven guilty? I seriously question the integrity of the yellow media and low-intelligence commenters for spewing such damagaing rhetoric before this case has even been...”
Respond
“I take it that he only did half of 27 years which is 13 1/2 years .He apparently missed his inmate friends. What made him think he could get away...”
Respond
“How can we get this started at Bluewater ? yeah Mrs Crist , still loving and making a difference in children’s lives .”
Respond
“This is such an awesome idea! Ms. Crist was my daughter Valerie's 2nd grade teacher when Valerie attended Bluewater Elementary School! Ms. Crist was born to teach!! Nellie Bogar, Youth...”
Respond