Phishing is a Major Threat

Phishing is a Major Threat

Fishing - a jerk on one end of a line waiting for a jerk on the other end.
Phishing - very similar to fishing, but much more consequential.

While the word phishing is humorous and relatable due to it being derived from the word “fishing”, the consequences of falling victim to a phishing attack are far from comical. Today we will discuss just how serious these attacks can be, and the easiest way to prevent them.

You are the only thing that can truly protect you from a phishing attack. Without participation, it simply is a phishing attempt. Hackers are always looking for clever ways to fool their potential victims, so can you trust your employees to recognize the telltale signs of a phishing attempt?

Habitual Efforts to Foil Phishers

Learning to do things the correct way is a lot easier than breaking a habit. Here are a few habits you can train your staff to do to recognize and avoid phishing attempts: 

Check Links BEFORE Opening Them

Getting in the habit of clicking links without checking the URL is an all-too-common mistake amongst staff. If you receive a link and want to know where it will take you, all you have to do is hover over it. If you aren’t able to see the link, or the entire link, you can also right click it and copy the address it will take you to. From there you can paste it into a notepad and further examine it. 

While a trained eye can detect a phishing attempt, some phishers cleverly disguise their links.

Learn How to Spot Fraudulent Links

If your eye is untrained, and you aren’t able to identify the legitimacy of these two links, BNMC is here to help.


Which of those two links would you confidently click on? Hopefully you said the first one. The tell-tale sign that a URL is coming from a fraudulent website is there will be a “dot” after the domain. The domain (, is typically read as example dot com. So, if you see a link that says example dot com dot something, the link is more than likely a phishing attempt. If you aren’t entirely sure, your best bet is to avoid the link entirely. 

Another method phishers will often use is slight alterations in domain names. Our minds are trained to read words even when the “in between” characters are incorrect, or characters are in the wrong order. As long as the first letter and last letter are correct, typically we can make out the words without issue.

Don’t believe me? Quickly skim through this list:


Did you notice the incorrect link right away? If not, take a closer look. This simple practice is used by phishers with great results. 

Emotions Lead to Phishing Vulnerability

Becoming a victim of a phishing attempt is easier than you might think. Once emotions are involved, instincts often kick in and result in an easy hookset. Let’s take a look at a few scenarios.

“Congratulations! You have won a free iPad!”

If you are lucky enough to win an item for absolutely no reason, chances are you are unlucky enough to fall victim to a phishing attempt too. Avoid these links at all costs.

“You have been issued with a driver’s violation:
Type: Speeding
Amount due: $143

This fee will be forwarded by mail to your address. However, you can screen it now by pressing here: DMV Notification”

This one is more difficult to recognize, and frustration can easily get in the way of habitual email awareness. It is important to train your staff to recognize all different types of attempts. Examples are the easiest way for your staff to understand just how easy it is to fall victim. Here at BNMC, we encourage safe email practices. If you would like other tips on how to keep your business safe, call us today at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 22 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Email User Tips Privacy Computer Microsoft Malware Productivity Hackers Network Security Google Software Business Hosted Solutions Communication Data Hardware Tech Term Mobile Devices Internet Small Business IT Services Efficiency Ransomware Cloud Computing IT Support Smartphone Data Recovery Backup Managed IT Services Outsourced IT Android Workplace Tips Innovation Upgrade Windows Saving Money Business Continuity Data Backup Office 365 Miscellaneous Managed IT Services Smartphones Microsoft Office Information Mobile Device Users Social Media Business Management Windows 10 Data Management Internet of Things Server Phishing Browser Windows 10 Vulnerability Passwords Remote Monitoring Productivity Word communications Facebook Gmail Cybersecurity App Infrastructure Disaster Recovery Encryption VoIP Managed Service Chrome Gadgets Artificial Intelligence Network Tip of the week Website Virtual Reality Apps Analytics VPN Applications BYOD Managed Service Provider Employer-Employee Relationship Money IT Support Save Money Automation Office Tips Unified Threat Management Antivirus Development Google Drive Content Filtering Bandwidth Big Data Maintenance Government Employee-Employer Relationship Access Control Apple Education Storage IT Management Settings Router Display Quick Tips Hacker Data storage Company Culture Paperless Office YouTube Robot Risk Management WiFi Two-factor Authentication Managing Stress Bring Your Own Device Operating System LiFi End of Support Managed IT Service Social Data loss Avoiding Downtime Hosted Solution Telephone Systems Scam Administration Laptop desktop The Internet of Things Mouse HIPAA Collaboration Firewall Search SaaS Networking Holiday Computers Virtualization Downtime Mobile Security Document Management Data Security Wireless Printing Server Management OneNote Solid State Drive Retail Business Technology Alert Touchscreen Business Intelligence Virtual Private Network Tablet Hard Disk Drive Vendor Management Monitors Chromebook Augmented Reality Spam Computing MSP Outlook Running Cable Websites Social Networking Monitoring Solid State Drives Address Permissions Computing Infrastructure Professional Services Shortcuts Mobile Management User Error Chatbots eWaste Employee-Employer Relationships Budget Patch Management Buisness Star Wars Streaming Processor Wearable Technology Network upgrade iOS Information Technology Specifications Sports Nanotechnology Troubleshooting Business Analysis Typing Humor Customer Relationship Management Safety Virtual Desktop Profiles Digital Payment Current Events Heating/Cooling Multi-Factor Security Motherboard Cables Spying National Security Best Practice Remote Computing Alerts USB Security Cameras Time Management Printer Identity Continuity Analysis Students Disaster Network Congestion Break Fix Fraud Cost Management Human Error Memory Digital Smart Office Scalability Black Friday Screen Reader Charging Virus Cryptocurrency Managed Services Utility Computing IT solutions Going Green Servers Wi-Fi Google Calendar BDR Wires Updates Google Docs Writing Emergency Licensing Dongle Network Management Cybercrime Solar Mixed Reality Uninterrupted Power Supply Dark Web Assessment Device Reducing Cost Hacks Spyware Work Migration File Sharing Google Wallet Dark Data Marketing Update Cyber Monday Smart Tech LED Threats Computer Care Bitcoin IBM Laptops Remote Workers Legislation Voice over Internet Protocol PowerPoint Business Growth Cooperation Service Level Agreement Identity Theft Password SharePoint Politics Compliance Data Breach Legal Microsoft Excel Hotspot Internet Exlporer Mobility Batteries IT Technicians Optimization Windows 7 Unified Communications Drones Customer Service Managed IT Smart Technology Connectivity Co-Managed IT Training Windows 8 Corporate Profile Techology Leominster Software as a Service Managed Services Provider Automobile Statistics Halloween Private Cloud Modem FinTech Onboarding GDPR G Suite How To Office Lenovo Samsung Staff Mobile Device Management Downloads Tech Support Regulations Slack Hard Disk Drives Deep Learning Dell Mail Merge Blockchain Language Value Print Toner Myths Mirgation Recycling Messaging Cabling Shortcut Distributed Denial of Service IoT Content Huawei WannaCry VoIP Unified Threat Management K-12 Schools Entertainment Vendor Google Maps Bluetooth Comparison Scary Stories Cookies Digital Signage Data Warehouse Alt Codes Firefox Social Engineering Superfish IT Budget Mobile Computing Physical Security Web Server what was your? Twitter Gadget Emoji GPS Upgrades IT Consultant Crowdsourcing Personal Information Botnet Cameras 3D Printing Meetings Cortana Tracking Printers Cleaning Machine Learning CCTV Processors Unsupported Software Webcam Regulation Error Computer Repair Relocation Mobile Data Point of Sale Ben McDonald shares Travel Recovery Financial How To Work/Life Balance Health Supercomputer CrashOverride Black Market Motion Sickness Staffing Law Enforcement Administrator Electronic Medical Records Taxes Notifications

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3