Bredy Network Management Corporation Blogs

2 minutes reading time (408 words)

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

BNMC can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at 978-482-2020 to learn more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, July 23 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Malware Privacy Hackers Business Computing Internet Software Microsoft Google Business Mobile Devices Network Security Computer Hosted Solutions Ransomware Managed IT Services Smartphone Android Tech Term IT Services Hardware Windows Small Business IT Support Backup Data Management Business Continuity Cloud Computing Data Windows 10 Cybersecurity Browser User Tips Innovation Internet of Things App Artificial Intelligence Gmail Remote Monitoring Encryption Data Recovery Server Facebook Business Management Saving Money Communication Office 365 Data Backup Productivity Disaster Recovery Vulnerability Productivity Smartphones Money IT Support Chrome Managed Service Provider Infrastructure Phishing Managed IT Services Windows 10 Efficiency Word Tip of the week Outsourced IT Analytics Website Office Tips communications Antivirus Government Employer-Employee Relationship Network Microsoft Office Passwords Big Data Data storage IT Management Settings Robot Google Drive Applications Content Filtering YouTube Bandwidth Upgrade Social Media Risk Management Apple Avoiding Downtime Company Culture Scam Storage Wireless SaaS Managing Stress The Internet of Things Holiday BYOD Mobile Device VPN Paperless Office Alert VoIP Data Security Spam Computing Business Technology Outlook Server Management Virtual Private Network HIPAA WiFi Unified Threat Management Monitors LiFi Data loss Vendor Management Workplace Tips Hosted Solution Mobile Security Save Money Telephone Systems Administration Automation Mouse End of Support Maintenance Miscellaneous Firewall Two-factor Authentication Virtual Reality Uninterrupted Power Supply Modem FinTech Remote Computing Running Cable User Error Document Management Staff Spyware Leominster Education Hacks Patch Management Managed IT Service Network Congestion Google Wallet Customer Relationship Management Computer Care Language IBM Value Buisness Bitcoin Specifications File Sharing Regulations Printing Solid State Drive IoT Sports Business Growth Heating/Cooling Multi-Factor Security Mirgation Recycling Virtual Desktop Break Fix Cookies MSP Writing Laptop Legal Time Management Printer Identity Theft Augmented Reality K-12 Schools Wi-Fi Password Social Networking Computers Unified Communications Drones Networking Training Computing Infrastructure Corporate Profile Professional Services Windows 8 Search Black Friday Emergency Hard Disk Drive Star Wars Hacker Servers Google Calendar Automobile Chatbots eWaste Dark Data Dark Web Dell Nanotechnology Development Retail Deep Learning Network Management Access Control Wearable Technology Network upgrade Cabling Motherboard Cables Display Cybercrime Alerts WannaCry USB Politics Downtime Cyber Monday Fraud Cost Management Marketing Alt Codes Legislation Google Maps Identity Continuity Customer Service Microsoft Excel Screen Reader Charging Office Gadgets Samsung Bring Your Own Device Operating System Touchscreen SharePoint Smart Office Wires Budget Quick Tips Techology Licensing Dongle Tech Support Social Managed IT Smart Technology Chromebook Information Technology How To Lenovo Assessment Typing Humor Statistics Tablet Solar Current Events Mail Merge Blockchain desktop Smart Tech Social Engineering Users Halloween Best Practice Downloads Digital Payment Work Disaster Router Voice over Internet Protocol VoIP Unified Threat Management Cooperation Digital Service Level Agreement Websites Shortcut Distributed Denial of Service Apps Firefox Superfish Hotspot Internet Exlporer Cryptocurrency Bluetooth Comparison Collaboration Compliance Business Intelligence IT solutions Going Green Address Permissions Connectivity Safety Scary Stories Google Docs IT Technicians Optimization Webcam Personal Information Botnet Cortana 3D Printing Error Point of Sale Ben McDonald shares Processors Machine Learning Virtualization Unsupported Software Travel G Suite Update Supercomputer CrashOverride Computer Repair Relocation Mobile Device Management Motion Sickness Staffing Mobile Data Recovery Taxes How To Work/Life Balance Administrator Web Server what was your? IT Budget Health Private Cloud Mobile Computing BDR Black Market GPS IT Consultant Law Enforcement Cameras Notifications Electronic Medical Records Meetings Twitter Tracking Physical Security Emoji Cleaning Upgrades Gadget CCTV Crowdsourcing

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3