Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

BNMC can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at 978-482-2020 to learn more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 26 September 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Cloud Best Practices Technology Email Privacy Malware Hackers Hosted Solutions Business Computing Internet Software Computer Windows Google Ransomware Microsoft IT Services Backup Business Windows 10 Network Security App Hardware Smartphone Data Business Continuity Innovation IT Support Saving Money Data Management Productivity Cloud Computing Phishing Internet of Things Mobile Devices Android Data Recovery Efficiency Robot Google Drive Upgrade Managed IT Services Small Business Word Settings Data storage Remote Monitoring Gmail Office Tips Big Data Smartphones Facebook Administration Content Filtering Mobile Device Analytics Risk Management Office 365 End of Support Windows 10 Artificial Intelligence Network Telephone Systems Encryption Tip of the week Alert Chrome Microsoft Office Vulnerability Hosted Solution Server User Tips Productivity Workplace Tips Money Outlook IT Management Cybersecurity YouTube Monitors Save Money Social Media communications IT Support Miscellaneous Unified Threat Management Disaster Recovery Managed IT Services Browser Apple Passwords SaaS LiFi Outsourced IT Managed Service Provider Emergency IBM Computer Care Customer Service Network Management Wireless Office Computing Business Technology Corporate Profile IT solutions Vendor Management Training Operating System Automobile Social Touchscreen Dell Social Engineering Information Technology Managed IT Lenovo Best Practice WannaCry Running Cable Google Maps Buisness Virtual Desktop Safety Shortcut Superfish Data loss Laptop Google Docs Network Congestion Hacks Deep Learning desktop Google Wallet Patch Management Politics Scam Business Growth Customer Relationship Management Digital Spam Firewall Downtime Computers Collaboration Password Heating/Cooling Bring Your Own Device Drones Samsung Gadgets Hacker Spyware Display File Sharing Servers Solid State Drive Bandwidth VPN Halloween Websites Users Alt Codes Employer-Employee Relationship Apps Server Management Hard Disk Drive Education Budget Virtual Private Network Scary Stories Humor Typing Quick Tips Cabling Website Automation Current Events Statistics Mouse Mail Merge Sports Cryptocurrency VoIP How To Unified Communications Virtual Reality Infrastructure Communication Going Green Bluetooth Address The Internet of Things Storage Bitcoin Avoiding Downtime Firefox Digital Payment Disaster Writing VoIP Printing Antivirus Data Backup Maintenance WiFi Cybercrime Legal Dark Data Marketing Windows 8 Time Management Uninterrupted Power Supply Retail Search Mobile Data Law Enforcement Error Recovery Ben McDonald shares Point of Sale Gadget Chromebook Paperless Office Physical Security Staffing Administrator Emoji what was your? Web Server Processors Holiday Personal Information GPS Business Management Cortana Cameras Wi-Fi Tracking Virtualization CCTV Tech Support Networking Computer Repair Document Management Mobile Device Management How To Notifications Health Identity Theft Black Market Travel Mobile Computing G Suite Crowdsourcing Botnet CrashOverride Electronic Medical Records Supercomputer Twitter Motion Sickness Upgrades Taxes Government Machine Learning IT Budget Remote Computing 3D Printing IT Consultant BYOD Relocation Meetings Unsupported Software Cleaning Work/Life Balance Private Cloud Update Webcam

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3