facebook linkedin twitter

Computerware Blog

Three Tricks to Spot Phishing Attempts

Three Tricks to Spot Phishing Attempts

Cybersecurity needs to be a priority to any business that wants to continue their operations in the long-term. One threat that is very common today is the phishing attack.

In 2018, there was an increase in the prevalence of phishing attacks by 269 percent when compared to their prevalence in 2017. In addition, a full 32 percent of reported data breaches that year featured phishing to some extent. United States businesses may have had cause for the most concern, as nearly 86 percent of phishing attacks targeted American companies.

NCSAM’s Phishing-Heavy Theme: “Own IT. Secure IT. Protect IT.”

With National Cybersecurity Awareness Month well underway, it’s high time to pay attention to some of its lessons. These lessons effectively boil down to pretty basic practices that any user should cultivate into habits. Naturally, this includes some anti-phishing tactics.

Remember, you also have another knowledgeable resource to lean on for advice - we’re always available to assist you and your team. For instance, try implementing these best practices in your processes now to avoid phishing:

  • Don’t trust surprise messages: One of the first signs that a message is hiding a phishing attack is if it just appears in your inbox. Let’s say you suddenly get an email that says that it’s from Amazon, claiming that your account needs to have its payment credentials verified after some suspicious purchases were made. Stop and consider some other facts before you react… have you received something like a receipt in your inbox for something that you didn’t order, or an anticipated delivery date? Any emails can - and should - be examined in this way to ensure that you aren’t walking into a threat. It’s generally a good idea to reach out to the alleged sender through a different form of communication for confirmation.

  • Make sure the details match up: When we get an email, it’s pretty typical that we only take a quick glance at who sent it without giving it a second thought. If a cybercriminal is worth their salt, they would have used a fake email that isn’t quite perfect, but passes the “quick glance” test. For instance, would you sooner click on an email from “,” or one from “?”

    The right answer is “neither,” as in “neither A-C-L-M-I-N or G-R-N-A-I-L actually say what they appear to say at first.” Therefore, they are most likely traps.

  • Don’t trust surprise links or attachments, either: You need to be prepared before you even open a message, and this is one of the reasons why. Some links and attachments contain malware, or automatically direct you to a website that will begin installing the malware. Some have been especially tricky, asking the user to confirm the download, but completing the installation regardless of what they pick. Again, unless you expected an attachment or a link, think twice before just clicking through. It doesn’t hurt to confirm its legitimacy through another means, either.

Sure, October is National Cybersecurity Awareness Month, but hackers and cybercriminals don’t go into hibernation for the rest of the year. You should be sure that you’re just as secure for every one of the other 264 days as well. Computerware can help - reach out to us at (703) 821-8200 to learn more. 

Taking a Look at the History of Cybersecurity
Communications You Can Use to Make Doing Business ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, December 14, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Microsoft Hardware Workplace Tips Network Security Backup Managed Service Provider Productivity Hosted Solutions Business Email Malware IT Services Saving Money Efficiency Computer Google Productivity IT Support User Tips Innovation Small Business Smartphones Mobile Devices VoIP Quick Tips Data Backup Microsoft Office Collaboration Business Continuity communications Gadgets IT Support Social Media Android Network Data Recovery Disaster Recovery Upgrade Server Cybersecurity Mobile Office Communication Virtualization Mobile Device Management Smartphone Miscellaneous Phishing Ransomware Tech Term Windows 10 Windows Outsourced IT Holiday Operating System Vendor Management Unified Threat Management Passwords Apps Facebook Automation Managed IT Services Remote Monitoring Users Internet of Things BYOD Remote Computing Managed IT services Mobile Computing BDR Mobile Device Analytics WiFi Apple History Artificial Intelligence Data Management Marketing The Internet of Things Browser Save Money Firewall Alert App Cloud Computing Big data Windows 10 Help Desk Two-factor Authentication Bandwidth Business Technology IT Consultant Encryption Spam Office 365 Training Printer Antivirus Gmail Government Office Health Cybercrime Content Filtering Information Technology Going Green Hard Drives Maintenance Bring Your Own Device Wireless Technology Virus Saving Time Tech Support Computers Search VPN Managed Service Managed IT Employer-Employee Relationship Retail Lithium-ion Battery Best Practice Cost Management Outlook Information Windows 8 Hiring/Firing Budget Customer Service It Management Windows 7 Travel Blockchain Education Data Loss Recovery Update Phone System Networking Hacking Project Management IBM Money Document Management Healthcare Access Control File Sharing Administration Law Enforcement Applications Hard Drive Intranet Twitter Compliance Mobility Website Patch Management Solid State Drive Data storage Avoiding Downtime Conferencing iPhone Risk Management Current Events Data Breach Value Password Legal Save Time Hacker Downtime Customer Relationship Management Regulations Augmented Reality PowerPoint Proactive IT SaaS Computing Running Cable Humor End of Support Social Networking Hosted Solution Social Robot Data Security Securty Wireless Google Maps DDoS Storage Social Engineering Black Market Flexibility Scam Word Cryptocurrency Laptop Monitoring Business Growth Business Intelligence Private Cloud Cortana Excel Digital Digital Payment Telephony Websites Router Management Machine Learning Fax Server Vulnerabilities Telephone Systems Comparison Tablet Paperless Office Sports Company Culture Disaster User Computer Repair Vendor Virtual Desktop Webcam Processor Specifications Safety Text Messaging Vulnerability Identity Theft Statistics Bitcoin Programming Data Protection IT service Network Congestion Documents Teamwork Heating/Cooling Distribution Entertainment Virtual Reality Downloads Politics Professional Services Inbound Marketing Emails Bluetooth Streaming Media Automobile Chromebook Computing Infrastructure Hack Voice over Internet Protocol Redundancy User Error Google Docs Net Neutrality Meetings Pain Points Co-managed IT Memory How To eWaste Experience Chrome Download Evernote Wi-Fi Monitors Virtual Assistant Cleaning Office Tips Multi-factor Authentication Tech Terms Computer Accessories Microchip Taxes Telephone Processors Lifestyle Start Menu Distributed Denial of Service USB Managed IT Service Mobile Technology YouTube Trending Presentation Gaming Console Cooperation Software as a Service Unified Communications Settings Uninterrupted Power Supply Mouse Public Cloud Licensing Archive Business Cards Service Level Agreement Banking Botnet Managing Costs Spyware Mobile Payment Skype Startup Asset Tracking Relocation Tablets GPS Microserver Microsoft 365 Sync External Harddrive Browsers Electricity Printing Username Medical IT Trend Micro Permissions Language Unified Threat Management Backup and Disaster Recovery Proactive Maintenance Gamification Notifications CCTV Digital Signature Security Cameras Threats Point of Contact Screen Reader Customer Resource management Get More Done User Tip Piracy Upload Business Metrics Computer Malfunction Printer Server Navigation Thin CLient Virtual Machine cache Television switches Writing Smart Tech Reliable Computing 3D Turn Key Solutions Ebay Music In Internet of Things Smart Phones Trojan Data Analysis Employees WannaCry Upgrades HTML eCommerce Fiber-Optic Database SQL Server Corporate Profile Recycling Mobile Security Organize GDPR Managing Risk Time Management Freedom of Information LiFi Analytic Telephone System PDF Software License Trends Motion Sickness Best Available Keyboard Tech Leadership Hypervisor Assessment SharePoint Product Reviews Multi-Factor Security Cost Scalability Adminstration Integration Pirating Information Tactics Fileless Malware Hybrid Cloud Google Calendar Deep Learning Devices Messenger Tracking Domains Tip of the week Work/Life Balance Read Fraud Proxy Server Azure VoIP UTM Content Rental Service Public Speaking Modem Strategy Touchscreen News Visible Light Communication Device Management IT Plan Enterprise Resource Planning Web Server Shortcut Webinar Term Managed Services Provider Consultation IT consulting Legislation Error Cabling Electronic Medical Records Transportation Knowledge email scam Addiction Administrator Entrepreneur Directions Display Technology Tips Business Managemenet Accountants A.I. Books Workers Troubleshooting Recording Content Management Environment Dark Web Free Resource Audit CIO Supercomputer HIPAA Upselling SSID How To Fake News Advertising Flash Staffing Google Wallet online Currency Migration Connected Devices Competition Processing Managed Services Data Warehousing Windows XP Wireless Headphones Worker Electronic Payment Health IT Employee/Employer Relationship Video Surveillance Network Management Saving ZTime Wasting Time Access Displays Equifax Fleet Tracking Reading Samsung Business Owner Logistics Emergency Hard Drive Disposal Society Best Practives Bookmark Computer Care Micrsooft LinkedIn Device security MSP Employer Employee Relationship IP Address Cyber security Microsoft Excel G Suite Debate Drones Desktop Finance Hacks Physical Security Application Harddrive Google Play Telephone Service Google Drive Windows Server 2008 Nanotechnology Social Network Human Resources Employer/Employee Relationships Financial Printers Managing Stress CrashOverride Regulation Holidays 3D Printing Capital Personal Information Productuvuty

toner1