Protecting Yourself from Phishing and Impersonation

At CData Software, the security of our customers, partners, and potential employees is our top priority. Phishing attacks and impersonation scams are a growing global threat, affecting individuals and organizations across all industries. Cybercriminals are constantly evolving their tactics to steal sensitive information, financial data, and personal identities.

As part of our commitment to your security, CData Software wants to provide you with the knowledge and tools you need to recognize and protect yourself against these types of scams.


What is Phishing?

Phishing is a type of cyberattack where an attacker pretends to be a trusted company or individual to trick you into providing personal, financial, or login information. Phishing attempts often come through:

  • Emails
  • Phonecalls
  • Text messages
  • Social media messages
  • Fake websites

Learn more about phishing from Cloudflare and Microsoft.


How to Recognize a Phishing or Impersonation Attempt

When communicating with CData Software, watch for these signs of a potential scam:

  • Unfamiliar Email Domains: Official emails from CData Software will come from addresses ending in @cdata.com. Be cautious if the sender's email domain is misspelled or slightly altered (e.g., @cdatasoftware.com, @cdata-software.com, etc.).
  • Requests for Sensitive Information: We will never ask you to share sensitive information such as passwords, social security numbers, or financial information via email, text, or instant message.
  • Urgent or Threatening Language: Phishing attempts often try to create a sense of urgency ("Act now or your account will be closed!") to pressure you into responding quickly.
  • Suspicious Links or Attachments: Hover over links before clicking. If the URL looks strange or unrelated to cdata.com, do not click it. Be cautious with unexpected attachments.
  • Job Offers That Seem Too Good to Be True: If you receive an unsolicited offer for a remote job, equipment reimbursement, or money transfer related to CData, verify it through our official Careers page or reach out to us directly.
  • Payment Requests: CData Software will never request payments via unconventional methods (gift cards, cryptocurrency, personal bank transfers).

Examples of Red Flags

Legitimate Phishing/Scam

Email from @cdata.com domain

Email from similar but misspelled domains

Professional communication style

Poor spelling, grammar errors, urgent tone

Instructions to use our official portals

Requests for personal info over unsecured methods

Official job postings on CData Careers

Unsolicited job offers through unofficial channels


What To Do If You Suspect Phishing

  • Do not click any links or download attachments.
  • Do not reply to suspicious messages.
  • Forward suspicious emails to our security team at [email protected].
  • Report phishing attempts to your email provider or relevant authorities.
  • Double-check offers or requests by contacting us through our official website: https://www.cdata.com/

Stay Safe

CData Software will continue to monitor and take action against these fraudulent activities. By staying informed and vigilant, you can protect yourself and your information.

For more information on online security, we encourage you to review trusted resources such as:


FAQ: Common Questions About Phishing at CData Software

Always check the sender's email address carefully. All official CData Software emails come from an @cdata.com domain. If you're unsure, contact us directly through our website.
No. CData Software will never ask for sensitive banking information, request payment, or offer jobs without a formal interview process and communication from our official domain.
Immediately disconnect from the internet if possible, run a security scan on your device, and change any passwords that may have been compromised. Then contact our security team at [email protected].
No. Applying for a job with CData is completely free, and all CData products include access to a free tier of customer support.
Forward the suspicious email or details to [email protected]. We appreciate your vigilance!

Security or privacy questions? Our team is here to help.