Trope Homepage Slide

Endodontics course at HQ

Join your colleagues at NJDA HQ on Friday, June 24 from 9-5pm for Anatomically Driven Endodontics, presented by Dr. Martin Trope.

Learn More
Clinicals Homepage

Come to NJDA HQ

We want to see you this June for our live clinical in-person programs! Come get hands-on application on a variety of topics.

Learn More
2022 Lunch Sessions Homepage Slide 2.25.22

CE Programs for Dental Team Members

As a member dentist, you give your staff access to discounted CE programs to help fulfill their licensure requirements.

Learn More

Help Strengthen the Voice of Dentistry

NJDPAC does not support a political party.
It supports a profession -- your profession.


Helping Members Succeed

The New Jersey Dental Association is the voice of the dental profession and a strong proponent of oral health in the state. Members are part of a vibrant community of dentists encompassing 12 local dental societies as well as the American Dental Association. Members engage in educational programs, have access to dentist-centric relationships and tools to navigate the business of dentistry and their careers, as well as benefit from dedicated advocacy that protects the interests of the profession. The organization is run by member-dentists with the support of a team of professionals at NJDA Headquarters. NJDA members never practice alone!


DENTAL NEWS AND NOTES     Read More Dental News

Cyber Liability: Watch for These 6 Phishing Scams

This article describes six common types of phishing scams to watch out for and provides actionable suggestions for how to mitigate them.


Types of Phishing Scams
Many significant cyberattacks have included a phishing component. In fact, in its 2021 Data Breach Investigation Report, Verizon noted that phishing played a role in approximately one-third of all breaches analyzed. The following are six of the most common types of phishing scams:

  1. Deceptive phishing—Deceptive phishing is when a cybercriminal impersonates a recognized sender to steal personal data and login credentials. These emails often trick victims by asking them to verify account information, change a password or make a payment.
  2. Spear phishing—A spear-phishing scheme is typically aimed at specific individuals or companies and uses personalized information to convince victims to share their data. In these instances, cybercriminals will research a victim's online behavior—such as where they shop or what they share on social media—to collect personal details that make them seem legitimate.
  3. Whaling—Whaling aims to trick high-profile targets such as CEOs, chief financial officers and chief operating officers into revealing sensitive information, including payroll data or intellectual property. Since many executives fail to attend company security trainings, they are often vulnerable to whaling scams.
  4. Vishing—Vishing, or "voice phishing," occurs when a criminal calls a target's phone to get them to share personal or financial information. These scammers often disguise themselves as trusted sources, such as a bank or the IRS, and rely on creating a sense of urgency or fear to trick a victim into giving up sensitive information.
  5. Smishing—Smishing refers to "SMS phishing" and incorporates malicious links into SMS text messages. These messages often appear to be from a trustworthy source and lure victims in by offering a coupon code or a chance to win a free prize.
  6. Pharming—Pharming is a sophisticated method of phishing that redirects a victim to a site of the cybercriminal's choosing by installing a malicious program onto their computer. The goal is to have users input their login credentials or personal information, such as credit card numbers, on the fraudulent site.

How to Protect Against Phishing Scams
As more criminals turn to online scams to steal personal and company information, business leaders and employees must remain vigilant in their cybersecurity efforts. While no single cybersecurity solution can avert all phishing attacks, the following actions can minimize their frequency and severity:

  • Stay informed about phishing techniques. IT administrators should constantly monitor for new phishing scams and implement employee training accordingly. Utilizing mock phishing scenarios can help prepare employees for real attempts.
  • Examine a message before clicking. Phishing scams often contain off-kilter URLs, so inspect the web address before clicking on the website. A secure website always starts with "https." When in doubt, go directly to the source rather than clicking a potentially dangerous link. In addition, phishing scams depend on emotional lures to attract victims, so be wary of messages that incite an emotional or fearful response.
  • Keep computer systems up to date. Security patches are released for computer systems to secure loopholes that cybercriminals inevitably discover and exploit. Download and install new software as soon as it's available, including browser updates.
  • Never give out personal information. As a general rule, never share personal or financially sensitive information over the internet. When in doubt, go to the company's direct webpage and call to see if the request is legitimate.
  • Use antivirus software. Implement antivirus software on all work systems to detect and prevent phishing attacks.
  • Back up data regularly. Since phishing attacks often leave behind malware, including ransomware, companies should have a robust data backup program so attacks don't hinder the organization's productivity.

Phishing scams are becoming more sophisticated and severe. By taking the proper precautions, organizations can minimize their damage. For additional risk management guidance and insurance solutions, contact us today.

Visit  to learn more or get a quote online in minutes.

This Cyber Risks & Liabilities document is not intended to be exhaustive nor should any discussion or opinions be construed as legal advice. Readers should contact legal counsel or an insurance professional for appropriate advice. © 2021 Zywave, Inc. All rights reserved.