Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to payypal.com and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

BNMC can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at 978-482-2020 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 18 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Email Malware Hackers Business Computing Microsoft Hosted Solutions Ransomware Internet Software Computer IT Services Windows Google Network Security Windows 10 Backup Business Smartphone Data Management Business Continuity Data Innovation Android App Hardware Small Business Cloud Computing Managed IT Services Browser User Tips Tip of the week Internet of Things Remote Monitoring Saving Money Mobile Devices Productivity IT Support Phishing Google Drive Productivity Upgrade Data Recovery Cybersecurity Gmail Office Tips IT Support Data storage Big Data Smartphones Facebook Outsourced IT Efficiency Risk Management Artificial Intelligence Office 365 Settings Word Robot End of Support YouTube Employer-Employee Relationship communications Social Media Disaster Recovery Windows 10 Microsoft Office Unified Threat Management Passwords Managed IT Services Money Outlook LiFi Maintenance Managed Service Provider Monitors Administration Vulnerability Save Money Content Filtering Mouse IT Management Miscellaneous Analytics Apple Mobile Device Virtual Private Network SaaS Network Encryption Telephone Systems Alert Computing Chrome Antivirus Hosted Solution Server Workplace Tips File Sharing Apps Best Practice Halloween Users Emergency Solid State Drive Access Control Network Management Education Safety Websites Google Docs Scary Stories Business Technology Hard Disk Drive SharePoint Touchscreen Network Congestion Hacks Website Google Wallet Managed IT Unified Communications Business Growth Sports Cabling Lenovo Downloads Computers Government Password Drones How To The Internet of Things Shortcut Hacker Infrastructure Superfish VoIP Two-factor Authentication Display BYOD WiFi Firefox Cybercrime Digital Payment Patch Management Scam Customer Relationship Management Alt Codes Disaster Marketing Multi-Factor Security Heating/Cooling Budget Networking Humor Typing Uninterrupted Power Supply IBM Google Calendar Computer Care Servers Automation Current Events IT solutions Wireless VPN Data Security Virtual Reality Cryptocurrency Corporate Profile Legislation Training Server Management Communication Going Green Running Cable Automobile Dell Techology Quick Tips Storage Bitcoin Buisness Virtual Desktop WannaCry Tablet Statistics Writing Printing Legal Laptop Google Maps Mail Merge Unified Threat Management VoIP Dark Data Deep Learning Windows 8 Data loss Bluetooth Retail Spam Address desktop User Error Avoiding Downtime Customer Service Bring Your Own Device Downtime Digital Office Politics Vendor Management Collaboration Operating System Firewall Gadgets Data Backup Printer Time Management Samsung Social Information Technology Bandwidth Spyware Search Social Engineering Physical Security Emoji Notifications Cyber Monday Identity Theft Personal Information Travel Cortana G Suite Crowdsourcing CrashOverride Supercomputer Botnet Wi-Fi Motion Sickness Virtualization Taxes IT Budget Machine Learning Computer Repair IT Consultant Mobile Device Management How To Relocation Health Meetings Black Market Cleaning Work/Life Balance Mobile Computing Private Cloud Electronic Medical Records Webcam Twitter Law Enforcement Upgrades Error Point of Sale Ben McDonald shares Remote Computing Gadget 3D Printing Paperless Office Staffing Unsupported Software Administrator what was your? Update Web Server Processors Comparison GPS Holiday Mobile Data Business Management Recovery Cameras Specifications Tracking Chromebook CCTV Black Friday Document Management Tech Support

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3