ADVERTISEMENT
TechEconomy
Sunday, June 1, 2025
No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
Podcast

Home ยป Vishing: The Voice Scam You Need to Know About

Vishing: The Voice Scam You Need to Know About

John Mc Loughlin, a cybersecurity expert and CEO of J2 Software warns about vishing

Techeconomy by Techeconomy
April 8, 2025
in Security
0
John Mc Loughlin, CEO of J2 Software - Financial & Cybersecurity, good businesses | vishing
John Mc Loughlin, CEO of J2 Software

John Mc Loughlin, CEO of J2 Software

RelatedPosts

Cyberdefence SensePost

SensePost debuts SecDevOps: A developer-oriented Security Training Course

May 29, 2025

Check Point to Acquire Veriti Cybersecurity

May 28, 2025

Cybercriminals are always finding new ways to trick people, and one of the latest scams on the rise is called vishing, short for voice phishing.

Unlike email scams (known as phishing), vishing happens over the phone. Recent studies have highlighted a dramatic escalation in vishing attacks.

Theย 2025 CrowdStrike Global Threat Reportย documented a 442% surge in vishing incidents from the first to the second half of 2024.

Additionally, research from Enea indicates that vishing, smishing, and phishing attacks have increased by 1,265% since the launch of ChatGPT.

John Mc Loughlin, cybersecurity expert and CEO of J2 Software, says this type of scam is becoming more common – and more convincing.

โ€œHere’s how it usually works: a scammer calls you, pretending to be from your bank or another trusted company.โ€

โ€œTheyโ€™ll say your account has been hacked and then ask you to โ€˜verifyโ€™ your identity by giving them private information like your PIN or password. Because the call feels urgent and sounds real, people often fall for it,โ€ he warns.

Vishing versus Phishing

The Oxford Dictionary defines vishing as a scam where someone pretends to be from a trusted company and tricks one into giving out personal details, like bank or credit card information.

โ€œWhile both vishing and phishing aim to steal your private info, the big difference is how they do it. Phishing usually comes through fake emails or websites. Vishing uses voice calls or voicemails to create a sense of urgency and pressure you into acting quickly. This voice approach can feel more personal – and more convincing,โ€ he explains.

Scammers are also getting smarter. They now use spoofing technology to make it look like they’re calling from a real company, which makes these calls even harder to spot. Thatโ€™s why itโ€™s more important than ever for both people and businesses to update their security measures and focus on education and awareness.

How to protect yourself from Vishing

Here are a few simple tips to help stay safe:

  • Donโ€™t give out personal info over the phone, especially if the call was unexpected.
  • Hang up if something feels off. Trust your gut.
  • Double-check whoโ€™s calling. Instead of trusting the caller ID, call the company back using their official number.
  • Use spam call blockers. Many phones and apps can help block scam calls before they reach you.

Stay Alert, Stay Safe

Fighting cybercrime isnโ€™t just about having the right tech – itโ€™s also about being aware and cautious. Whether you’re at home or work, being informed about scams like vishing helps keep your personal and company data safe.

โ€œThe bottom line? Stay alert, ask questions, and donโ€™t let a phone call rush you into sharing sensitive information. Thatโ€™s how we can all stay one step ahead of the scammers,โ€ he concludes.

More about J2 Software

J2 Software is a cyber security-focused technology business founded in 2006 to address the critical need for effective cybersecurity, governance, risk, and compliance solutions that are practical and purpose-built. With the continued rise of cybercrime, identity theft, and confidential data leakage, J2 Software’s mission is to provide managed cyber security services that are not just a competitive advantage but an absolute business necessity.

Its comprehensive managed cyber security services cater to businesses of all sizes, ensuring greater visibility to identify risky behaviour and enhancing the capability to respond effectively to prevent losses. The team understands that cybersecurity is essential for protecting valuable assets and maintaining business continuity.

J2 Software delivers essential tools that empower organisations to take control of their technology spend. Its hand-picked solutions, combined with expert services, provide complete visibility over our customers’ environments while reducing risk and lowering costs.

With a dedication to improving the cyber resilience of our customers, J2 Software has expanded its reach globally, serving more than 700 customers across 5 continents. Its commitment to innovation, reliability, and customer satisfaction has made the company a trusted partner in the ever-evolving landscape of cybersecurity.ย 

Loading

Advertisements
MTN ADS

0Shares
Tags: J2 SoftwareJohn Mc Loughlinvishing
Previous Post

Woherem Unveils New Book, โ€œBuilding A New Africaโ€

Next Post

Naira Crashes in Official Market, Closes at N1,612/$1

Techeconomy

Techeconomy

Related Posts

Cyberdefence SensePost
Security

SensePost debuts SecDevOps: A developer-oriented Security Training Course

by Destiny Eseaga
May 29, 2025
0

Orange Cyberdefence SensePost will be launching a new information security training course aimed at enriching software developers with security thinking....

Read more
Check Point to acquire Veriti

Check Point to Acquire Veriti Cybersecurity

May 28, 2025
Autonomous Cyber threats | Nigeria - Transparent Transformation, Bridging digital divide, Nigerian Businesses and cybersecurity by Oluwole Asalu

Nigeria Must Prepare for the Rise of Autonomous Cyber Threats

May 27, 2025
DDoS and NETSCOUT

Nigeria, Mali Lead West Africa in DDoS Attacks for Late 2024, Says NETSCOUT

May 27, 2025
Airtel Photo AI SPAM ALERT - Copyright - Techeconomy

Airtel AI Spam Alert Service Flags 9.6 million Spam Attempts in Two Months

May 26, 2025
Business security by John Mc Loughlin, J2 Software CEO | Honeypot as a Service

Why We Introduced ‘Honeypot as a Service’ – J2 Software

May 20, 2025
Next Post
Nigeria and USD, Nigerian Banking System - Naira

Naira Crashes in Official Market, Closes at N1,612/$1

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Techeconomy Podcast

Techeconomy Podcast
Techeconomy Podcast

Infowave is brought to you by TechEconomy. Every week we will bring new stories from startups and influencers who are shaping and changing the world we live in. We’ll also bring you reports on topics you should know.

Follow us @techeconomyng for more.

TECH TALK EPISODE 2
byTecheconomy

PRODUCTIVITY AND WORK-Life Balance

TECH TALK EPISODE 2
TECH TALK EPISODE 2
May 22, 2025
Techeconomy
CYBERSECURITY ESSENTIALS
April 24, 2025
Techeconomy
Digital Marketing Trends and strategies for 2025 and beyond
February 27, 2025
Techeconomy
Major Lesson for Techies in 2024 and Projections for 2025
December 6, 2024
Techeconomy
Major Lessons for Techies in an AI-Driven World | Techeconomy Business Series Highlights
November 26, 2024
Techeconomy
Maximizing Profitability Through Seasonal Sales: Strategies For Success
November 8, 2024
Techeconomy
Techeconomy Business Series
October 15, 2024
Techeconomy
PRIVACY IN THE ERA OF AI: GETTING YOUR BUSINESS READY
May 30, 2024
Techeconomy
Unravel the Secrets of Marketing Everywhere All At Once with Isaac Akanni from Infobip | Infowave Podcast Episode 1
February 9, 2024
Techeconomy
The Role of Ed-tech in Life Long Learning and Continuous Education
October 19, 2023
Techeconomy
Search Results placeholder

WHAT IS TRENDING

https://www.youtube.com/watch?v=g_MCUwS2woc&list=PL6bbK-xx1KbIgX-IzYdqISXq1pUsuA4dz

Follow Us

  • About Us
  • Contact Us
  • Careers
  • Privacy Policy

ยฉ 2025 Techeconomy - Designed by Opimedia.

No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS

ยฉ 2025 Techeconomy - Designed by Opimedia.

Translate ยป
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.