Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to payypal.com and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

BNMC can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at 978-482-2020 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 16 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Email Malware Hackers Business Computing Internet Microsoft Hosted Solutions Software IT Services Business Ransomware Android Computer Smartphone Google Windows Network Security Windows 10 Backup Small Business Business Continuity Data Browser Innovation Internet of Things App Hardware Data Management Tip of the week Managed IT Services Remote Monitoring Cloud Computing User Tips Smartphones Saving Money Artificial Intelligence Outsourced IT Encryption Mobile Devices Data Recovery Productivity IT Support Phishing Office 365 Upgrade Office Tips Gmail Word Vulnerability Data storage Productivity Big Data Cybersecurity Money Managed Service Provider Facebook IT Support Efficiency Risk Management Settings Robot Windows 10 Google Drive Two-factor Authentication Telephone Systems Business Management communications Alert Social Media Scam Firewall Disaster Recovery Microsoft Office Passwords Employer-Employee Relationship IT Management Outlook Virtual Private Network LiFi Monitors Administration Save Money Content Filtering Government Automation Unified Threat Management Mouse Managed IT Services Miscellaneous Analytics Apple Antivirus SaaS Maintenance Data Backup Network Mobile Device Computing Chrome Hosted Solution Server Workplace Tips Bandwidth End of Support YouTube Holiday Safety Education Google Docs Patch Management Scary Stories Managed IT Service desktop Alerts Digital Network Congestion Hacks Customer Relationship Management Website Politics Multi-Factor Security Google Wallet Heating/Cooling Collaboration Unified Communications Business Growth Sports Samsung Wi-Fi Break Fix Spyware Computers Networking Password File Sharing The Internet of Things Google Calendar Drones Servers Solid State Drive VPN Hacker Dark Web VoIP Display Data Security Websites WiFi Cybercrime Legislation Server Management Microsoft Excel Hard Disk Drive Alt Codes Marketing Techology Quick Tips Statistics Tablet Cabling Budget Blockchain Humor Mail Merge Typing How To Unified Threat Management Current Events VoIP Bluetooth IT solutions Comparison Infrastructure Virtual Reality Permissions Address Cryptocurrency BYOD Firefox Communication User Error Digital Payment Going Green Avoiding Downtime Running Cable Specifications Disaster Fraud Storage Bitcoin Buisness Writing Printer Printing Time Management Virtual Desktop Legal Search Laptop Black Friday Uninterrupted Power Supply Mobile Security IBM Dark Data Emergency Deep Learning Computer Care Windows 8 Retail Access Control Wireless Network Management Spam Cyber Monday Hotspot Corporate Profile Customer Service Business Technology Bring Your Own Device Training Downtime Office SharePoint Touchscreen Automobile Operating System Managed IT Gadgets Vendor Management Smart Technology Dell Language WannaCry Lenovo Social Social Engineering Downloads Google Maps Information Technology Shortcut Apps Best Practice Halloween Users Distributed Denial of Service Computing Infrastructure Data loss Superfish Cameras Personal Information Cortana Tracking CCTV Virtualization Licensing Document Management Tech Support Notifications Computer Repair Identity Theft Mobile Device Management Travel How To G Suite Crowdsourcing Health Black Market CrashOverride Supercomputer Mobile Computing Botnet Motion Sickness Taxes Electronic Medical Records Twitter IT Budget Machine Learning Upgrades IT Consultant Remote Computing Relocation Meetings 3D Printing Cleaning Work/Life Balance Private Cloud Webcam Unsupported Software Update Law Enforcement Error Point of Sale Mobile Data Ben McDonald shares Recovery Gadget Paperless Office Chromebook Staffing Administrator Web Server Processors Physical Security what was your? Emoji GPS

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3