Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

BNMC can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at 978-482-2020 to learn more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Malware Privacy Hackers Business Computing Software Internet Ransomware Microsoft Hosted Solutions Network Security Android IT Services Business Google Mobile Devices Computer Backup Smartphone Windows Small Business Data Management Windows 10 Innovation Server Business Continuity Browser Cloud Computing Data Internet of Things App Hardware Artificial Intelligence Encryption Productivity Office 365 Phishing IT Support Business Management Gmail Data Recovery Managed IT Services Smartphones Managed Service Provider User Tips Tip of the week Efficiency Saving Money Remote Monitoring Outsourced IT Chrome Settings Antivirus Robot Google Drive Office Tips Word Upgrade Productivity Big Data Windows 10 Cybersecurity Facebook Data storage Money IT Support Infrastructure Vulnerability Risk Management IT Management Communication Mobile Device Hosted Solution Bandwidth Workplace Tips Computing Data loss Holiday Data Backup YouTube Telephone Systems HIPAA communications Alert Social Media Mobile Security End of Support Firewall Disaster Recovery Business Technology Passwords Employer-Employee Relationship LiFi Microsoft Office Two-factor Authentication Administration Content Filtering Government Outlook Scam Unified Threat Management Monitors Managed IT Services Analytics BYOD Save Money Automation Mouse Maintenance VPN Virtual Reality Miscellaneous Data Security Network Server Management Apple Virtual Private Network SaaS Storage Tablet Spam Statistics Writing Printing Regulations Legal Corporate Profile Training Blockchain Bring Your Own Device Mail Merge Downtime VoIP Dark Data Windows 8 Augmented Reality Automobile Unified Threat Management Dell Paperless Office Comparison Bluetooth Retail Gadgets WannaCry Permissions Address User Error Avoiding Downtime Customer Service Google Maps Wearable Technology Specifications Apps Office Halloween Users Operating System Fraud Vendor Management Printer Education Time Management Social desktop Black Friday Search Social Engineering Scary Stories Information Technology Website Digital Best Practice Politics Emergency Collaboration Access Control Network Management Applications Cyber Monday Unified Communications Samsung Safety Sports Google Docs Spyware Document Management Hotspot Tech Support File Sharing SharePoint Touchscreen Network Congestion The Internet of Things Hacks IT Technicians Solid State Drive Smart Technology Managed IT Google Wallet VoIP Business Growth Identity Theft Language Websites Lenovo Wi-Fi Downloads WiFi Computers Cybercrime Password Mirgation Marketing Hard Disk Drive Distributed Denial of Service Shortcut Drones Hacker Computing Infrastructure Superfish Display Cabling Chatbots Managed IT Service Patch Management Customer Relationship Management How To Alt Codes Alerts Multi-Factor Security IT solutions Heating/Cooling Identity Budget Break Fix Humor Firefox Typing Digital Payment Licensing Networking Google Calendar Servers Running Cable Current Events Disaster Tech Term Dark Web Buisness Virtual Desktop Cryptocurrency Cooperation Legislation Remote Computing Laptop Going Green Uninterrupted Power Supply Compliance IBM Computer Care Microsoft Excel Deep Learning Quick Tips Bitcoin Wireless Staff Techology Point of Sale Ben McDonald shares Gadget Unsupported Software Update Staffing Mobile Data Administrator Recovery what was your? Web Server Processors GPS Chromebook Cameras Tracking Physical Security Emoji CCTV Personal Information Cortana Notifications Travel Virtualization G Suite Crowdsourcing Computer Repair CrashOverride Supercomputer Botnet Motion Sickness Mobile Device Management Taxes How To Health IT Budget Machine Learning Black Market Mobile Computing IT Consultant Electronic Medical Records Relocation Meetings Twitter Cleaning Work/Life Balance Upgrades Private Cloud Webcam Law Enforcement 3D Printing Error

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3