A logo for soteria technology solutions with a spartan helmet

Tips from the Techs: Smishing

July 6, 2021

Smishing. Like phishing, but for phones.

In our last blog post, we talked about protecting yourself from malicious emails. Unfortunately, that's not the only way that cybercriminals try to trick you into giving away your data. They’re also targeting mobile phones.


Here's how it works: the scammers send out a text message, possibly claiming to be from a well-known company. Often they look like a notification that a courier attempted to deliver a package. These messages contain a link for you to click and rearrange delivery. But when you click the link, you’re taken to a spoof page which steals your information as soon as you enter it. This allows the scammer behind it to use those details to access your online accounts. Or gives them access to your device.


This is called Smishing - the cell phone equivalent of phishing.


What can you do to protect yourself?

  • Beware of any unexpected SMS (text) messages asking you to take an action by clicking a link or calling a number. If you’re unsure if it’s a genuine message, contact the company directly using the details on their website or any paperwork you have from them.


  • Be aware that smishing exists, and keep any eye out for suspicious texts. Just being aware of the issue is the first step in stopping it.


  • If you get a text message that you think is a smishing attempt, do not click on any links in it. Don't even open it to read if you don't need to. Delete it immediately, and congratulate yourself on thwarting a scammer.



Soteria offers a variety of security solutions ranging from email filtering all the way up to enterprise-level

fully managed and monitored security operations.

If you have any questions or would like more information about these or other products, we are only an email or call away.
Contact Us

This post, like all our posts, is 100% written by a human.

Share this Post

A woman hides her face behind a library book
December 10, 2024
A rare win this month, these scammers are in trouble.
a book with fanned pages and blurry background
By Erin Patten November 20, 2024
Revisiting the Ghost Books Scam - with real-world consequences.
The insightly podcast logo
November 1, 2024
Tariq talks all things cybersecurity with the podcast hosts Alyssa and Jordan.
the silhouette of a woman's face is covered with a projection of green computer code
September 30, 2024
A freely accessible database containing full background data for about a third of all Americans was just uncovered on the internet.
A new two-story home with a soft pink and blue sunset in the background.
August 28, 2024
Real Estate scams and wire fraud costs Americans hundreds of millions of dollars every year. One victim shares her story.
A 19th century engraving of three rough and hungry looking children searching for potatoes.
July 24, 2024
A look at what insights history can offer us about how things like this happen.
A closeup photo of a boxer's shoulders and arms. They are wearing black boxing gloves.
By Erin Patten July 8, 2024
Gigantic password leaks keep rolling in; and they keep getting bigger. How can you keep your accounts safe?
A screenshot from KSN Channel 3, of a newscaster speaking in front of a screen showing computer code
June 24, 2024
Cyberattacks have led to an outage in the software car dealerships across North America use to run their operations - making dealerships rely on pen and paper again, and putting untold amounts of personal data at risk.
A robot hand explores a blue imagined universe of connected webs of dots
By Erin Patten June 17, 2024
Researchers recently proved that GPT-4 can find and exploit unknown security weaknesses - by itself. It's a whole new world for cybersecurity.
More Posts
Share by: