facebook linkedin twitter

Computerware Blog

Three Tricks to Spot Phishing Attempts

Three Tricks to Spot Phishing Attempts

Cybersecurity needs to be a priority to any business that wants to continue their operations in the long-term. One threat that is very common today is the phishing attack.

In 2018, there was an increase in the prevalence of phishing attacks by 269 percent when compared to their prevalence in 2017. In addition, a full 32 percent of reported data breaches that year featured phishing to some extent. United States businesses may have had cause for the most concern, as nearly 86 percent of phishing attacks targeted American companies.

NCSAM’s Phishing-Heavy Theme: “Own IT. Secure IT. Protect IT.”

With National Cybersecurity Awareness Month well underway, it’s high time to pay attention to some of its lessons. These lessons effectively boil down to pretty basic practices that any user should cultivate into habits. Naturally, this includes some anti-phishing tactics.

Remember, you also have another knowledgeable resource to lean on for advice - we’re always available to assist you and your team. For instance, try implementing these best practices in your processes now to avoid phishing:

  • Don’t trust surprise messages: One of the first signs that a message is hiding a phishing attack is if it just appears in your inbox. Let’s say you suddenly get an email that says that it’s from Amazon, claiming that your account needs to have its payment credentials verified after some suspicious purchases were made. Stop and consider some other facts before you react… have you received something like a receipt in your inbox for something that you didn’t order, or an anticipated delivery date? Any emails can - and should - be examined in this way to ensure that you aren’t walking into a threat. It’s generally a good idea to reach out to the alleged sender through a different form of communication for confirmation.

  • Make sure the details match up: When we get an email, it’s pretty typical that we only take a quick glance at who sent it without giving it a second thought. If a cybercriminal is worth their salt, they would have used a fake email that isn’t quite perfect, but passes the “quick glance” test. For instance, would you sooner click on an email from “,” or one from “?”

    The right answer is “neither,” as in “neither A-C-L-M-I-N or G-R-N-A-I-L actually say what they appear to say at first.” Therefore, they are most likely traps.

  • Don’t trust surprise links or attachments, either: You need to be prepared before you even open a message, and this is one of the reasons why. Some links and attachments contain malware, or automatically direct you to a website that will begin installing the malware. Some have been especially tricky, asking the user to confirm the download, but completing the installation regardless of what they pick. Again, unless you expected an attachment or a link, think twice before just clicking through. It doesn’t hurt to confirm its legitimacy through another means, either.

Sure, October is National Cybersecurity Awareness Month, but hackers and cybercriminals don’t go into hibernation for the rest of the year. You should be sure that you’re just as secure for every one of the other 264 days as well. Computerware can help - reach out to us at (703) 821-8200 to learn more. 

Taking a Look at the History of Cybersecurity
Communications You Can Use to Make Doing Business ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, July 12, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Hackers Data Business Management Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Hosted Solutions Productivity Business Productivity Email Malware IT Services Saving Money Efficiency Google Computer Small Business User Tips Innovation Collaboration VoIP IT Support Data Backup IT Support Smartphones Quick Tips Mobile Devices Network communications Business Continuity Microsoft Office Gadgets Android Cybersecurity Data Recovery Disaster Recovery Social Media Upgrade Communication Mobile Office Server Virtualization Smartphone Phishing Miscellaneous Mobile Device Management Holiday Ransomware Vendor Management Passwords Tech Term Outsourced IT Apps Windows Windows 10 Managed IT Services Operating System Internet of Things Mobile Device Facebook Remote Monitoring Users Unified Threat Management BDR Automation Mobile Computing Analytics Managed IT services Data Management BYOD Remote Computing Apple WiFi Windows 10 Artificial Intelligence Training Marketing History The Internet of Things Cloud Computing Firewall Browser Save Money Alert Big data Help Desk Encryption Spam Business Technology App Information Technology Office Bandwidth Office 365 Health IT Consultant Two-factor Authentication Going Green Government Cybercrime Managed IT Access Control Bring Your Own Device Maintenance Printer Antivirus Windows 7 Hard Drives Budget Gmail Content Filtering Lithium-ion Battery Best Practice Recovery Outlook Windows 8 Employer-Employee Relationship Retail Managed Service Cost Management Wireless Technology Tech Support Virus Search Hiring/Firing Information Computers Saving Time Healthcare VPN Travel Remote Work Project Management Computing Education IBM Update Augmented Reality Humor Hacking It Management Data Security Money Blockchain Document Management Networking Data Loss Phone System iPhone Customer Service Twitter Intranet SaaS Storage Website Applications Covid-19 Law Enforcement Voice over Internet Protocol Customer Relationship Management Risk Management Solid State Drive PowerPoint Compliance Conferencing Value Data storage Password File Sharing Hard Drive Save Time Flexibility Hacker Downtime Administration Mobility Patch Management Legal Vendor Computer Repair Running Cable Avoiding Downtime Proactive IT Regulations Current Events Data Breach Wireless Digital Disaster DDoS Telephony Machine Learning Hosted Solution Excel Websites End of Support Telephone Systems Robot Securty Fax Server Word Software as a Service Net Neutrality Business Intelligence Cortana Digital Payment Black Market Google Maps Cryptocurrency Router Monitoring Laptop Comparison Tablet Business Growth Cooperation Social Engineering Company Culture Management User Scam Social Networking Vulnerabilities Virtual Desktop Meetings Private Cloud Paperless Office Social Wi-Fi Sports Teamwork Heating/Cooling Professional Services Virtual Assistant Entertainment Microchip Taxes Streaming Media Distributed Denial of Service Integration Start Menu Tech Terms Mobile Technology Lifestyle Distribution IT service Public Cloud Licensing Managed Services Provider Gaming Console Uninterrupted Power Supply eWaste Identity Theft Vulnerability Chrome Cost Bluetooth How To Webcam Bitcoin Text Messaging Managed Services Employee/Employer Relationship Data Protection Smart Devices Virtual Reality Google Docs Computer Accessories Processors Politics Memory Managed IT Service USB Automobile Experience Emails Downloads Cleaning Presentation Multi-factor Authentication Chromebook Monitors Trending Inbound Marketing Computing Infrastructure Hack Office Tips Mouse Telephone Processor How To Redundancy Specifications Safety Programming Download YouTube Statistics Evernote Network Congestion User Error Solutions Pain Points Documents Unified Communications Co-managed IT Settings Technology Tips Business Cards Service Level Agreement Drones eCommerce Startup Asset Tracking Supercomputer Webinar Data Analysis Employees Backup and Disaster Recovery Electronic Health Records Worker GDPR Managing Risk Fake News Username Financial Data SQL Server Audit Unified Threat Management Language Tech Hypervisor Data Warehousing Analytic Gamification Upselling Recycling PDF Screen Reader Customer Resource management Memes Reading Samsung Permissions Access Video Surveillance Best Available Piracy Keyboard Product Reviews Upload Managing IT Services G Suite Holidays Emergency Hard Drive Disposal Smart Tech Employer Employee Relationship Fileless Malware Hybrid Cloud Fiber-Optic Database Surveillance Music Modem Strategy Saving ZTime Microsoft Excel HTML Domains Read Hacks Telework Physical Security switches Writing Proxy Server Azure Computer Care Term Google Drive Windows Server 2008 Mobile Security Public Speaking Banking Remote Workers Botnet Best Practives Upgrades Electronic Medical Records Transportation Telephone System IT Relocation Tablets Spyware Debate Mobile Payment Software License Shortcut Trends Virtual Private Network Sync Recording Optimization Harddrive Device Management Multi-Factor Security LiFi Directions Display Fraud Entrepreneur Business Managemenet Tactics Development Microserver SSID Troubleshooting Content Management Devices Notifications FinTech CCTV Dark Web Free Resource GPS Electricity Printing Work/Life Balance Processing External Harddrive HIPAA UTM Content Business Metrics Data Storage Computer Malfunction Deep Learning Health IT Environment Reliable Computing cache Television IT Plan Competition Enterprise Resource Planning Procurement In Internet of Things Get More Done Logistics Virtual Machines Electronic Payment online Currency Legislation Error Visible Light Communication Wasting Time email scam Addiction Video Conferencing Turn Key Cyber security Thin CLient Business Owner Accountants A.I. IT consulting Printer Server Bookmark 3D WannaCry Ebay Scalability Google Play Telephone Service Smart Phones Time Management Freedom of Information IP Address PCI DSS Motion Sickness Trojan Employer/Employee Relationships Corporate Profile LinkedIn Communitications Managing Costs Assessment SharePoint Migration Application Connected Devices Supply Chain Management CIO Microsoft 365 Wireless Headphones Human Resources Messenger Tracking Advertising Organize Flash Skype Network Management Internet Service Provider Staffing Google Wallet Medical IT Trend Micro Leadership Tip of the week Archive Equifax Fleet Tracking Rental Service Windows XP Browsers Adminstration Pirating Information Google Calendar IT Assessment Cabling Society Security Cameras Threats Touchscreen News Device security MSP Regulations Compliance Web Server Displays User Tip Proactive Maintenance VoIP Navigation Virtual Machine Consultation Digital Signature Point of Contact Desktop Finance Remote Working Administrator Micrsooft Knowledge Nanotechnology Social Network Books Workers Printers Capital Productuvuty Managing Stress Regulation 3D Printing Personal Information Financial CrashOverride

toner1