Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to payypal.com and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

BNMC can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at 978-482-2020 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 22 July 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Email Privacy Hackers Internet Hosted Solutions Business Computing Malware Computer Windows 10 Microsoft Business Google Windows Innovation Software IT Services App Hardware Data Ransomware Business Continuity Internet of Things Saving Money IT Support Smartphone Data Management Productivity Office Tips Gmail Big Data Facebook Efficiency Backup Mobile Devices Network Security Robot Google Drive Small Business Upgrade Cloud Computing Settings Managed IT Services Phishing Data storage communications IT Support Social Media Money Unified Threat Management Monitors Managed IT Services Save Money Browser Passwords Miscellaneous Smartphones Outsourced IT LiFi Apple Managed Service Provider Administration Android Content Filtering Mobile Device Analytics Risk Management Artificial Intelligence Telephone Systems Network End of Support Chrome Hosted Solution Server Productivity Cybersecurity Workplace Tips YouTube Cabling Display Customer Relationship Management Education Scary Stories Outlook Alt Codes How To Website Infrastructure Remote Monitoring Unified Communications Sports Budget Humor Typing Firefox Digital Payment Disaster Recovery Disaster The Internet of Things Automation IT Management Current Events Maintenance Mouse Cryptocurrency Virtual Reality VoIP Uninterrupted Power Supply Cybercrime Communication Quick Tips Going Green WiFi IBM Computer Care Marketing Storage Bitcoin Wireless SaaS Writing VoIP Printing Corporate Profile Training Legal Automobile Dark Data Windows 8 IT solutions Dell Retail Avoiding Downtime WannaCry Office 365 Customer Service Google Maps Running Cable Office Time Management Computing Data loss Buisness Vendor Management Operating System Social Virtual Desktop desktop Laptop Social Engineering Alert Information Technology Best Practice Deep Learning Digital Encryption Politics Collaboration Firewall Spam Word Safety Bring Your Own Device Spyware Downtime Google Docs File Sharing Network Congestion Hacks Solid State Drive Gadgets Google Wallet Business Growth Employer-Employee Relationship Computers Password Bandwidth Apps Hard Disk Drive Halloween Microsoft Office Users Drones Hacker User Tips Motion Sickness Mobile Device Management Taxes How To Government Machine Learning IT Budget Health Black Market Mobile Computing IT Consultant BYOD Relocation Electronic Medical Records Twitter Meetings Cleaning Upgrades Work/Life Balance Private Cloud Remote Computing Webcam 3D Printing Law Enforcement Error Ben McDonald shares Point of Sale Unsupported Software Gadget Update Paperless Office Staffing Mobile Data Administrator Recovery what was your? Web Server Processors GPS Holiday Business Management Chromebook Cameras Tracking Physical Security Emoji CCTV Samsung Document Management Personal Information Tech Support Cortana Notifications Websites Identity Theft Wi-Fi Virtualization Travel G Suite Crowdsourcing Botnet CrashOverride Supercomputer Computer Repair

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3