{"id":742,"date":"2005-03-29T10:14:46","date_gmt":"2005-03-29T10:14:46","guid":{"rendered":"http:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm"},"modified":"2007-03-12T23:41:23","modified_gmt":"2007-03-12T23:41:23","slug":"phishing-and-wider-issue-of-identity","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm","title":{"rendered":"Phishing and the wider issue of identity theft"},"content":{"rendered":"<p><a href=\"http:\/\/en.wikipedia.org\/wiki\/phishing\">Phishing<\/a> worries me. In fact, identity theft in general is one of my major concerns (and is the reason I refuse to do any more business with Halifax Bank of Scotland, one of the UK&#8217;s largest banks, who will not respond to letters or e-mails requesting that they remove my online access even though I have closed all of my accounts with them).<\/p>\n<p>According to <a href=\"http:\/\/www.itweek.co.uk\/\">IT Week<\/a>:<\/p>\n<blockquote><p>&#8220;The <a href=\"http:\/\/www.antiphishing.org\/\">anti-phishing working group<\/a> (APWG), which comprises security vendors, ISPs and financial institutions, has been serving as a clearing-house for information on attacks and trends for more than a year [and has] reported a 24% increase in phishing each month from August to December [2004]&#8221;.<\/p><\/blockquote>\n<p>Now a group of leading IT companies, including <a href=\"http:\/\/www.microsoft.com\/\">Microsoft<\/a> and <a href=\"http:\/\/rover.ebay.com\/rover\/1\/710-5232-2978-22\/1?aid=8132995&amp;pid=1875354\" target=\"_top\">eBay<\/a><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.tqlkg.com\/image-1875354-8132995\" border=\"0\" height=\"1\" width=\"1\" \/> (two companies which have themselves been affected by high-profile phishing attacks), along with electronic payment specialist <a href=\"http:\/\/www.visa.com\/\">Visa<\/a> and security solution provider <a href=\"http:\/\/www.wholesecurity.com\/\">WholeSecurity<\/a> have joined forces to create an early warning network for new attacks called the <a href=\"http:\/\/www.phishreport.net\/\">Phish Report Network<\/a>.<\/p>\n<p>Another Internet security and payment specialist, <a href=\"http:\/\/www.verisign.com\/\">Verisign<\/a>, has warned, in its fifth <a href=\"http:\/\/verisign.com\/Resources\/Intelligence_and_Control_Services_White_Papers\/internet-security-briefing.html\">Internet security intelligence briefing<\/a>, that phishing attacks are the biggest threat to online business, with just over 40% of phishing sites hosted in the US but further sites identified in a total of 37 countries. According to IT Week, Verisign added that effective action against phishing would require international co-operation between Internet service providers (ISPs) and law enforcement agencies.<\/p>\n<p>The problem of identity theft is broader than phishing. Since my mother&#8217;s credit card details were used fraudulently a couple of years back (identified, to their credit, by the same bank that I criticised at the head of this post), all of my family have been very careful about how we dispose of sensitive information, but that doesn&#8217;t stop me from having my card copied in a restaurant (in the UK, cards are rarely swiped using a mobile card payment terminal, as they would be in many countries &#8211; instead, they are taken away and returned with a slip for a signature a few minutes later, although this is changing with the introduction of <a href=\"http:\/\/www.chipandpin.co.uk\/\">chip and PIN technology<\/a>). In his recent article, <a href=\"http:\/\/www.itweek.co.uk\/comment\/1161451\">hook, line and stinkers<\/a>, which appeared in IT Week, David Neal notes that:<\/p>\n<blockquote><p>&#8220;Identity theft, enabled by a lackadaisical approach to filing and a loose relationship with paper-shredding machines, is big business these days. In fact incidents of stolen identities have rocketed from shoulder-shrugging insignificance in 1999 to a 10 on the &#8216;Holy Moly&#8217; scale this year&#8221;.<\/p><\/blockquote>\n<p>UK consumer watchdog <a href=\"http:\/\/www.which.com\/\">Which?<\/a> recently reported that <a href=\"http:\/\/trial.which.co.uk\/legal_advice.php?m_id=56&amp;source_code=j8uw04\">a quarter of UK adults have either had their identity stolen or knew someone who has been a victim of ID fraud<\/a>.<\/p>\n<p>One of the most common cases of identity theft is credit card fraud, which <a href=\"http:\/\/money.msn.co.uk\/bank_plan\/cards\/specfeat\/takethecredit\/creditcardskimming\/\">cost UK banks \u00c2\u00a3160 million last year<\/a> and someone has to pay for this (you guessed it &#8211; ultimately it is us, the consumers), and the UK is ranked second for the number of fraudulent transactions (whist online trade grew by 88% in Q4 2004, compared with the same quarter in 2003).<\/p>\n<p>The <a href=\"http:\/\/www.apacs.org.uk\/\">Association for Payment Clearing Services<\/a> (APACS) has launched <a href=\"http:\/\/www.cardwatch.org.uk\/\">Card Watch<\/a>, a website providing advice to consumers, retailers, police and media about card fraud. Meanwhile, credit card issuer, <a href=\"http:\/\/www.capitalone.co.uk\/\">Capital One<\/a> has started offering <a href=\"http:\/\/www.capitalone.co.uk\/web\/security\/\">fraud protection services<\/a> (somewhat embarrassingly, and unfortunately for him, the star of Capital One TV adverts, impersonator <a href=\"http:\/\/www.mirror.co.uk\/news\/allnews\/tm_objectid=15277077&amp;method=full&amp;siteid=50143&amp;headline=mcgowan--i-ve-bin-stupid-name_page.html\">Alistair McGowan, had his own rubbish searched by a tabloid journalist who obtained a significant number of items which could be used to steal his identity<\/a>).<\/p>\n<p>Whilst secure and accountable systems are a must, some gullible users will always fall foul of the type of fraud which most of us delete from our inbox without reading. The IT industry is taking action, with anti-phishing capabilities promised for a new Netscape browser and Microsoft promising anti-phishing tools in Internet Explorer 7. Meanwhile, legislation is also being considered, with the US Senate debating its proposed Anti-Phishing Act and the <a href=\"http:\/\/www.itweek.co.uk\/news\/1161848\">UK is considering its own legislation<\/a>, with early draft regulations as possibility as early as the end of this year.<\/p>\n<p>The financial services companies which I transact online with (<a href=\"http:\/\/www.firstdirect.com\/\">First Direct<\/a> and <a href=\"http:\/\/www.egg.com\/\">Egg<\/a>) will not correspond with me by e-mail about anything which requires personal information (i.e. only marketing information) &#8211; instead they have a private messaging system embedded within their secure websites. It&#8217;s a pain in the backside as I like to keep copies of my correspondence within my e-mail client long after my relationship with a company (and hopefully its secure website &#8211; take note HBoS) ends. Now other companies such as eBay are following the same path, but as Ken Young pointed out recently in IT Week:<\/p>\n<blockquote><p>&#8220;The power of email, after all, is that it arrives in your lap. How many of us would trundle down to the Post Office on the off-chance [that there may be some mail waiting there for us]? And therein lies the big problem with private e-mail services &#8211; it is a far more restricted form of the real thing. It&#8217;s safer, but much less useful.&#8221;<\/p><\/blockquote>\n<p>Young also notes that such systems represent a challenge to fraudsters who are likely to send out e-mails to entice users to fake inbox sites (with the intention of harvesting personal information), or to use keystroke logging software to gain access to users inboxes.<\/p>\n<p>Whatever happens, its clear that this issue will not disappear overnight. What is needed is consumer education, legal protection and increased use of <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/multiple-factor-security.htm\">multi-factor identification<\/a> &#8211; for example extending chip and PIN to the home PC.<\/p>\n<p><strong>Links<\/strong><br \/>\n<a href=\"http:\/\/www.itweek.co.uk\/specials\/1159732\">Gone phishing<\/a> (IT Week)<br \/>\n<a href=\"http:\/\/www.cardwatch.org.uk\/\">Card Watch<\/a><br \/>\n<a href=\"http:\/\/www.phishreport.net\/\">Phish Report Network<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing worries me. In fact, identity theft in general is one of my major concerns (and is the reason I refuse to do any more business with Halifax Bank of Scotland, one of the UK&#8217;s largest banks, who will not respond to letters or e-mails requesting that they remove my online access even though I &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Phishing and the wider issue of identity theft<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[43],"class_list":["post-742","post","type-post","status-publish","format-standard","hentry","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing and the wider issue of identity theft - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing and the wider issue of identity theft - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"Phishing worries me. In fact, identity theft in general is one of my major concerns (and is the reason I refuse to do any more business with Halifax Bank of Scotland, one of the UK&#8217;s largest banks, who will not respond to letters or e-mails requesting that they remove my online access even though I &hellip; Continue reading Phishing and the wider issue of identity theft\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2005-03-29T10:14:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2007-03-12T23:41:23+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.tqlkg.com\/image-1875354-8132995\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/phishing-and-wider-issue-of-identity.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/phishing-and-wider-issue-of-identity.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Phishing and the wider issue of identity theft\",\"datePublished\":\"2005-03-29T10:14:46+00:00\",\"dateModified\":\"2007-03-12T23:41:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/phishing-and-wider-issue-of-identity.htm\"},\"wordCount\":932,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"image\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/phishing-and-wider-issue-of-identity.htm#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.tqlkg.com\\\/image-1875354-8132995\",\"keywords\":[\"Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/phishing-and-wider-issue-of-identity.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/phishing-and-wider-issue-of-identity.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/phishing-and-wider-issue-of-identity.htm\",\"name\":\"Phishing and the wider issue of identity theft - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/phishing-and-wider-issue-of-identity.htm#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/phishing-and-wider-issue-of-identity.htm#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.tqlkg.com\\\/image-1875354-8132995\",\"datePublished\":\"2005-03-29T10:14:46+00:00\",\"dateModified\":\"2007-03-12T23:41:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/phishing-and-wider-issue-of-identity.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/phishing-and-wider-issue-of-identity.htm\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/phishing-and-wider-issue-of-identity.htm#primaryimage\",\"url\":\"http:\\\/\\\/www.tqlkg.com\\\/image-1875354-8132995\",\"contentUrl\":\"http:\\\/\\\/www.tqlkg.com\\\/image-1875354-8132995\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/phishing-and-wider-issue-of-identity.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing and the wider issue of identity theft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing and the wider issue of identity theft - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm","og_locale":"en_GB","og_type":"article","og_title":"Phishing and the wider issue of identity theft - markwilson.it","og_description":"Phishing worries me. In fact, identity theft in general is one of my major concerns (and is the reason I refuse to do any more business with Halifax Bank of Scotland, one of the UK&#8217;s largest banks, who will not respond to letters or e-mails requesting that they remove my online access even though I &hellip; Continue reading Phishing and the wider issue of identity theft","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm","og_site_name":"markwilson.it","article_published_time":"2005-03-29T10:14:46+00:00","article_modified_time":"2007-03-12T23:41:23+00:00","og_image":[{"url":"http:\/\/www.tqlkg.com\/image-1875354-8132995","type":"","width":"","height":""}],"author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Phishing and the wider issue of identity theft","datePublished":"2005-03-29T10:14:46+00:00","dateModified":"2007-03-12T23:41:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm"},"wordCount":932,"commentCount":1,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"image":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm#primaryimage"},"thumbnailUrl":"http:\/\/www.tqlkg.com\/image-1875354-8132995","keywords":["Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm","name":"Phishing and the wider issue of identity theft - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm#primaryimage"},"image":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm#primaryimage"},"thumbnailUrl":"http:\/\/www.tqlkg.com\/image-1875354-8132995","datePublished":"2005-03-29T10:14:46+00:00","dateModified":"2007-03-12T23:41:23+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm#primaryimage","url":"http:\/\/www.tqlkg.com\/image-1875354-8132995","contentUrl":"http:\/\/www.tqlkg.com\/image-1875354-8132995"},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Phishing and the wider issue of identity theft"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":56,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/five-ways-to-help-protect-your.htm","url_meta":{"origin":742,"position":0},"title":"Five ways to help protect your identity","author":"Mark Wilson","date":"Tuesday 8 February 2005","format":false,"excerpt":"A few months back I wrote about the Microsoft At Work microsite and its advice for maintaining your computer at work. It may be a little high level - but it is aimed at end users and that in itself is good because us techies are generally not too good\u2026","rel":"","context":"In \"Security\"","block_context":{"text":"Security","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/security"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":173,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/09\/office-2003-sp2-and-anti-phishing.htm","url_meta":{"origin":742,"position":1},"title":"Office 2003 SP2 and anti-phishing protection for Outlook 2003 released","author":"Mark Wilson","date":"Wednesday 28 September 2005","format":false,"excerpt":"Yesterday, Microsoft released Office 2003 Service Pack 2 (SP2). SP2 is basically a rollup of fixes for Office (full technical details can be found in Microsoft knowledge base article 887616) but it also includes enhancements to Outlook 2003's Junk E-mail Filter to provide protection against phishing attacks, automatically evaluating any\u2026","rel":"","context":"In \"Microsoft Office\"","block_context":{"text":"Microsoft Office","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/office"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9060,"url":"https:\/\/www.markwilson.co.uk\/blog\/2025\/06\/i-got-phished-and-i-should-have-known-better.htm","url_meta":{"origin":742,"position":2},"title":"I got phished \u2013 and I should have known better","author":"Mark Wilson","date":"Tuesday 10 June 2025","format":false,"excerpt":"After decades working in IT, I really should have known better. I do the training. Every year, like everyone else, I click through the e-learning as quickly as I can, answer the quiz at the end, and move on to something else. I've even been that person who feels suitably\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/ChatGPT-Image-Jun-9-2025-04_34_14-PM.png?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/ChatGPT-Image-Jun-9-2025-04_34_14-PM.png?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/ChatGPT-Image-Jun-9-2025-04_34_14-PM.png?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/ChatGPT-Image-Jun-9-2025-04_34_14-PM.png?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/ChatGPT-Image-Jun-9-2025-04_34_14-PM.png?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2440,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/07\/security-why-the-banks-just-don%e2%80%99t-get-it.htm","url_meta":{"origin":742,"position":3},"title":"Security &#8211; Why the banks just don&#8217;t get IT","author":"Mark Wilson","date":"Tuesday 10 July 2007","format":false,"excerpt":"A few weeks back, I read a column in the IT trade press about my bank's botched attempt to upgrade their website security and I realised that it's not just me who thinks banks have got it all wrong... You see, the banks are caught in a dilemma between providing\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3380,"url":"https:\/\/www.markwilson.co.uk\/blog\/2011\/12\/useful-links-december-2011.htm","url_meta":{"origin":742,"position":4},"title":"Useful Links: December 2011","author":"Mark Wilson","date":"Saturday 31 December 2011","format":false,"excerpt":"A list of items I've come across recently that I found potentially useful, interesting, or just plain funny: Automate your Dropbox - Perform actions based on Dropbox uploads (via Bill Minton) Aaron's Twitter Viewer - View a tweet in context (by @aaronsw via @daringfireball, although I'm sure I've seen this\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3874,"url":"https:\/\/www.markwilson.co.uk\/blog\/2012\/04\/is-apple-really-encouraging-me-to-click-a-link-that-could-go-anywhere.htm","url_meta":{"origin":742,"position":5},"title":"Is Apple really encouraging me to click a link that could go anywhere?","author":"Mark Wilson","date":"Friday 27 April 2012","format":false,"excerpt":"Earlier today I was installing an app on my iPad and the iTunes store wanted some \"additional security details\". \u00a0I set up some questions and answers, feeling reasonably confident that, as I was using the App Store app, the details were actually being taken by Apple. \u00a0In addition it requested\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=742"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/742\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}