Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

7 steps to stop phishing attacks from stealing your personal details

April 23, 2021


Phishing is a method of attack that can catch even the most careful of people. Pronounced like the sport, phishing works much the same way — dropping a lure into typically an email or text and then hoping someone bites.

The lure may be an email claiming to be from LinkedIn, with a link asking someone to log in with a name and password — and then steal that information. Or it could be pretending to be from their bank, stating they need to restore their account — and taken to a fake page which steals their details.

You may even encounter a fake app that is also phishing for details, as one iOS app called Setup for Amazon Alexa tried to do back in 2018. After downloading the app, it tried to get people to enter the IP address of their device and its serial number.