By accepting you will be accessing a service provided by a third-party external to

Phishing is a Major Threat

Phishing is a Major Threat

Fishing - a jerk on one end of a line waiting for a jerk on the other end.
Phishing - very similar to fishing, but much more consequential.

While the word phishing is humorous and relatable due to it being derived from the word “fishing”, the consequences of falling victim to a phishing attack are far from comical. Today we will discuss just how serious these attacks can be, and the easiest way to prevent them.

You are the only thing that can truly protect you from a phishing attack. Without participation, it simply is a phishing attempt. Hackers are always looking for clever ways to fool their potential victims, so can you trust your employees to recognize the telltale signs of a phishing attempt?

Habitual Efforts to Foil Phishers

Learning to do things the correct way is a lot easier than breaking a habit. Here are a few habits you can train your staff to do to recognize and avoid phishing attempts: 

Check Links BEFORE Opening Them

Getting in the habit of clicking links without checking the URL is an all-too-common mistake amongst staff. If you receive a link and want to know where it will take you, all you have to do is hover over it. If you aren’t able to see the link, or the entire link, you can also right click it and copy the address it will take you to. From there you can paste it into a notepad and further examine it. 

While a trained eye can detect a phishing attempt, some phishers cleverly disguise their links.

Learn How to Spot Fraudulent Links

If your eye is untrained, and you aren’t able to identify the legitimacy of these two links, BNMC is here to help.


Which of those two links would you confidently click on? Hopefully you said the first one. The tell-tale sign that a URL is coming from a fraudulent website is there will be a “dot” after the domain. The domain (, is typically read as example dot com. So, if you see a link that says example dot com dot something, the link is more than likely a phishing attempt. If you aren’t entirely sure, your best bet is to avoid the link entirely. 

Another method phishers will often use is slight alterations in domain names. Our minds are trained to read words even when the “in between” characters are incorrect, or characters are in the wrong order. As long as the first letter and last letter are correct, typically we can make out the words without issue.

Don’t believe me? Quickly skim through this list:


Did you notice the incorrect link right away? If not, take a closer look. This simple practice is used by phishers with great results. 

Emotions Lead to Phishing Vulnerability

Becoming a victim of a phishing attempt is easier than you might think. Once emotions are involved, instincts often kick in and result in an easy hookset. Let’s take a look at a few scenarios.

“Congratulations! You have won a free iPad!”

If you are lucky enough to win an item for absolutely no reason, chances are you are unlucky enough to fall victim to a phishing attempt too. Avoid these links at all costs.

“You have been issued with a driver’s violation:
Type: Speeding
Amount due: $143

This fee will be forwarded by mail to your address. However, you can screen it now by pressing here: DMV Notification”

This one is more difficult to recognize, and frustration can easily get in the way of habitual email awareness. It is important to train your staff to recognize all different types of attempts. Examples are the easiest way for your staff to understand just how easy it is to fall victim. Here at BNMC, we encourage safe email practices. If you would like other tips on how to keep your business safe, call us today at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, July 07 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing Privacy User Tips Cloud Email Network Security Hackers Hosted Solutions Microsoft Computer Business Software Efficiency Malware Communication Data Google IT Services Small Business Workplace Tips IT Support Mobile Devices Cloud Computing Tech Term Hardware Internet Managed IT Services Data Recovery Smartphone Android Ransomware Mobile Device Backup Innovation Users Outsourced IT Information Upgrade Saving Money Windows Smartphones Data Backup Facebook Phishing Miscellaneous Server Cybersecurity communications Business Continuity Windows 10 Disaster Recovery Business Management Microsoft Office Browser VoIP Social Media Office 365 Managed IT Services Network Productivity Internet of Things Data Management Windows 10 Passwords Gadgets Vulnerability Remote Monitoring App Gmail Word Chrome Managed Service Provider Apps Mobile Office Quick Tips Infrastructure Artificial Intelligence Encryption Managed Service Settings Information Technology Save Money Employer-Employee Relationship Networking Access Control VPN Applications Virtual Reality Analytics Router Website Government Company Culture BYOD Tip of the week Money IT Support Remote Workers Antivirus Development WiFi Robot HIPAA Google Drive Automation Content Filtering BDR Bandwidth YouTube Paperless Office IT Management Data Security Apple Risk Management Education Virtual Private Network Storage Office Tips Unified Threat Management Computers Hacker Data storage Employee-Employer Relationship Big Data Display Maintenance Collaboration Firewall Spam Avoiding Downtime Marketing Bring Your Own Device Operating System Document Management Data Breach Customer Relationship Management Scam Monitors LiFi Vendor Management Windows 7 IT Social Hosted Solution Solid State Drive Software as a Service Break Fix Social Network Humor Wireless Chromebook Administration Search Best Practice Mouse Training Hard Disk Drive Mobile Security End of Support Going Green Remote Work Remote Computing Server Management Business Technology Touchscreen Compliance Business Intelligence iOS Printing Managed IT SaaS Tablet Data loss Wi-Fi How To Password Laptop Regulations Holiday Conferencing Telephone Systems Virtualization desktop Managed Services The Internet of Things Retail Alert MSP Augmented Reality Two-factor Authentication Managing Stress Computing Downtime Managed IT Service Outlook OneNote Network upgrade Uninterrupted Power Supply Office Samsung Mobility Batteries Specifications Nanotechnology Spyware Health Private Cloud Gamification Wearable Technology Co-Managed IT Heating/Cooling Multi-Factor Security Motherboard Budget Cables Computer Care IBM Tech Support Alerts USB File Sharing Policy Identity Continuity Managed Services Provider Fraud Typing Cost Management Onboarding GDPR Time Management Printer Current Events Smart Office Social Engineering Print Toner Myths Black Friday Screen Reader Charging Identity Theft Slack Hard Disk Drives COVID-19 Twitter Content Huawei Servers Halloween Google Calendar Wires Corporate Profile Websites Messaging Emergency Holidays Licensing Dongle Procedure Solar G Suite Entertainment Vendor Dark Web Distribution Cryptocurrency Assessment Automobile Digital Signage Data Warehouse Network Management IT solutions Work Dell Safety Shortcuts Mobile Management Cyber Monday Smart Tech Google Docs Monitoring Solid State Drives Streaming Processor Scary Stories Legislation Voice over Internet Protocol WannaCry Employee-Employer Relationships Payment Card Cooperation Hacks Service Level Agreement Cabling Running Cable SharePoint PCI DSS Google Wallet Hybrid Cloud Microsoft Excel Logistics Hotspot Bitcoin Internet Exlporer Google Maps Network Congestion Troubleshooting Business Analysis IT Technicians Optimization Security Cameras Profiles Buisness Smart Technology Business Growth Connectivity Spying National Security Techology Writing Human Error Memory Statistics Sports Modem Legal FinTech Analysis Students Lenovo Virtual Desktop Inventory Staff Leominster Virus Downloads Unified Communications Drones Scalability Mail Merge Blockchain Asset Management Language Windows 8 Value Peripheral Mirgation Recycling Utility Computing Shortcut Distributed Denial of Service IoT Digital Payment Dark Data Update Updates VoIP Unified Threat Management Disaster Device Reducing Cost Bluetooth Comparison Deep Learning Cookies Digital Mixed Reality Firefox Superfish Shadow IT Mobile Device Management K-12 Schools LED Threats Social Networking Politics Migration Consulting Address Permissions Memes Computing Infrastructure Professional Services Management Chatbots eWaste Work/Life Balance Laptops Patch Management Alt Codes Star Wars Customer Service PowerPoint Cybercrime User Error Mobile Computing Webcam Black Market Financial Law Enforcement Error Point of Sale Ben McDonald shares Notifications Electronic Medical Records Physical Security Travel Upgrades Gadget Emoji Crowdsourcing Regulation Supercomputer CrashOverride Staffing Personal Information Botnet Motion Sickness Taxes 3D Printing Administrator Cortana Web Server what was your? IT Budget Processors GPS Machine Learning IT Consultant Unsupported Software Printers Cameras Meetings Tracking Computer Repair Relocation Cleaning Mobile Data CCTV How To Recovery

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3