Model Context Protocol (MCP) finally gives AI models a way to access the business data needed to make them really useful at work. CData MCP Servers have the depth and performance to make sure AI has access to all of the answers.
Try them now for free →Protecting Yourself from Phishing and Impersonation
At CData Software, the security of our customers, partners, and potential employees is our top priority. Phishing attacks and impersonation scams are a growing global threat, affecting individuals and organizations across all industries. Cybercriminals are constantly evolving their tactics to steal sensitive information, financial data, and personal identities.
As part of our commitment to your security, CData Software wants to provide you with the knowledge and tools you need to recognize and protect yourself against these types of scams.
What is Phishing?
Phishing is a type of cyberattack where an attacker pretends to be a trusted company or individual to trick you into providing personal, financial, or login information. Phishing attempts often come through:
- Emails
- Phonecalls
- Text messages
- Social media messages
- Fake websites
Learn more about phishing from Cloudflare and Microsoft.
How to Recognize a Phishing or Impersonation Attempt
When communicating with CData Software, watch for these signs of a potential scam:
- Unfamiliar Email Domains: Official emails from CData Software will come from addresses ending in @cdata.com. Be cautious if the sender's email domain is misspelled or slightly altered (e.g., @cdatasoftware.com, @cdata-software.com, etc.).
- Requests for Sensitive Information: We will never ask you to share sensitive information such as passwords, social security numbers, or financial information via email, text, or instant message.
- Urgent or Threatening Language: Phishing attempts often try to create a sense of urgency ("Act now or your account will be closed!") to pressure you into responding quickly.
- Suspicious Links or Attachments: Hover over links before clicking. If the URL looks strange or unrelated to cdata.com, do not click it. Be cautious with unexpected attachments.
- Job Offers That Seem Too Good to Be True: If you receive an unsolicited offer for a remote job, equipment reimbursement, or money transfer related to CData, verify it through our official Careers page or reach out to us directly.
- Payment Requests: CData Software will never request payments via unconventional methods (gift cards, cryptocurrency, personal bank transfers).
Examples of Red Flags
Legitimate | Phishing/Scam |
---|---|
Email from @cdata.com domain |
Email from similar but misspelled domains |
Professional communication style |
Poor spelling, grammar errors, urgent tone |
Instructions to use our official portals |
Requests for personal info over unsecured methods |
Official job postings on CData Careers |
Unsolicited job offers through unofficial channels |
What To Do If You Suspect Phishing
- Do not click any links or download attachments.
- Do not reply to suspicious messages.
- Forward suspicious emails to our security team at [email protected].
- Report phishing attempts to your email provider or relevant authorities.
- Double-check offers or requests by contacting us through our official website: https://www.cdata.com/
Stay Safe
CData Software will continue to monitor and take action against these fraudulent activities. By staying informed and vigilant, you can protect yourself and your information.
For more information on online security, we encourage you to review trusted resources such as:
FAQ: Common Questions About Phishing at CData Software
How can I tell if an email really came from CData Software?
Someone claiming to be from CData offered me a job and asked for personal banking info - is this normal?
What should I do if I clicked on a suspicious link?
Will CData ever ask me to pay to apply for a job or to receive support?
How do I report a phishing attempt?