facebook linkedin twitter

Computerware Blog

Tip of the Week: 5 Warning Signs of a Phishing Attack

Tip of the Week: 5 Warning Signs of a Phishing Attack

Phishing attacks are a very common threat nowadays. Between the classic message from a supposed Nigerian Prince to a sudden and urgent email from the bank with attachment in tow, we’ve all seen our share of them. That’s the trick to stopping them—being able to spot them. Let’s go over five signals that a message may be a phishing attempt.

URGENCY

If a message is written in such a way that it intentionally makes you panic, it’s more likely that it’s a phishing attack. While email has proven its worth to millions of individual users and businesses, it isn’t the first method of communication one would try with an urgent message if another mode of communication were available.

Regardless of how the message comes in, any message that raises your blood pressure should (ironically) be taken with a grain of salt and verified through another means.

Attachments

Email really is a remarkable tool, especially considering what can be sent through it as an attachment. An attacker, for instance, can send an entire malware payload along with their phishing email for you to open!

This is precisely why you should never click on an unanticipated email attachment, and even then, carefully consider whether or not you trust the anticipated ones. Keep in mind, most financial institutions (a favorite disguise of phishing attacks) would prefer you to call them, and likely wouldn’t send an attachment through email unprompted, as they have dedicated solutions for these needs. It is better to not download attachments at all unless you know what the contents are.

Spelling and Grammar Errors

This one is just common sense. Which “email” looks more legitimate to you?

“I would also like to discuss the services you are currently receiving from my company, and if we could perhaps figure out a way for you to put them to better use.”

or

“I would also like to diskcuss the services you am currently receiving my company from, and if we could figure out a way for you too put them to better use.”

I hope you answered that the first option looked more legitimate.

While this may be a crude and oversimplified example, the point stands: legitimate business messages are most likely reviewed and edited before being sent out. Phishing attacks, designed to take advantage of someone who isn’t paying close attention, are less likely to be. Your bank isn’t going to send you a message riddled with spelling errors, so keep an eye out. It might just pay to be a stickler.

Requests for Your Personal Information

Here’s another question for you: why would a business that likely already has your information (they are contacting you, after all) need you to give them sensitive information over an email?

Want a hint? They wouldn’t… at least, not very often at all.

Generally, scammers are the only ones who will ask for sensitive information, like credit card details or your social security number, over email. Legitimate businesses will have other, secure means of obtaining that information—they must remain compliant to their own requirements, after all.

Suspicious Links

Finally, we have to address the fact that links to other pages are remarkably easy for an attacker to mess with. If a link appears in an email you receive, you should always check where it goes before you click through to it. You can do this by hovering your cursor over it, which should cause an address to pop up.

If it’s an email message, make sure that you count how many periods there are in the web address. Any more than one, and you can typically start to get suspicious.

For your convenience, here’s a quick guide for you and your team:

  1. Everyone handles their domains a little differently, but use this as a general rule of thumb:
    • a. paypal.com - Safe
    • b. paypal.com/activatecard - Safe
    • c. business.paypal.com - Safe
    • d. business.paypal.com/retail - Safe
    • e. paypal.com.activatecard.net - Suspicious! (notice the dot immediately after PayPal’s domain name)
    • f. paypal.com.activatecard.net/secure - Suspicious!
  2. paypal.com/activatecard/tinyurl.com/retail - Suspicious! Don’t trust dots after the domain!
  3. Check the email in the header. An email from Amazon wouldn’t come in as . Do a quick Google search for the email address to see if it is legitimate.
  4. Always be careful opening attachments. If there is an attachment or link on the email, be extra cautious.
  5. Be skeptical of password alerts. If the email mentions passwords, such as “your password has been stolen,” be suspicious. 

Hopefully, this helps. For more help training your team to protect your business, or more IT advice and assistance in general, give Computerware a call at (703) 821-8200.

How to Fight Back Shadow IT
What If All Data Was Leaked at Once?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, October 31, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Hardware Workplace Tips Microsoft Network Security Productivity Backup Business Managed Service Provider Hosted Solutions Email Productivity IT Services Malware Efficiency Saving Money Google Innovation Small Business User Tips Collaboration Computer IT Support Data Backup VoIP Quick Tips Network IT Support Smartphones Business Continuity communications Mobile Devices Data Recovery Gadgets Microsoft Office Disaster Recovery Android Cybersecurity Social Media Upgrade Smartphone Mobile Office Phishing Server Communication Virtualization Miscellaneous Mobile Device Management Passwords Mobile Device Ransomware Operating System Holiday Windows Users Vendor Management Windows 10 Outsourced IT Internet of Things Tech Term Apps BDR Managed IT Services Unified Threat Management Facebook Remote Monitoring BYOD Automation Remote Computing Apple Data Management Mobile Computing Managed IT services Analytics WiFi Windows 10 Artificial Intelligence Marketing Training The Internet of Things Browser Cloud Computing History Firewall Covid-19 Help Desk Business Technology Save Money Alert App Big data Encryption Spam Health Office Bandwidth Managed Service Information Technology Office 365 Budget Two-factor Authentication IT Consultant Managed IT Content Filtering Going Green Maintenance Printer Access Control Gmail Information Bring Your Own Device Hard Drives Windows 7 Government Antivirus Cybercrime Blockchain VPN Wi-Fi Windows 8 Outlook Cost Management Remote Work Best Practice Lithium-ion Battery Tech Support Virus Networking Document Management Hiring/Firing Wireless Technology Recovery Saving Time Search Employer-Employee Relationship Healthcare Computers Retail Travel Education Hacking Update iPhone Project Management Conferencing Humor IBM Augmented Reality Customer Service Money Data Security Storage It Management Phone System Data Loss Computing Intranet Twitter Value Password Avoiding Downtime Data Breach Law Enforcement Applications Hacker Compliance Risk Management Solid State Drive Data storage Voice over Internet Protocol Flexibility Save Time Laptop File Sharing Downtime Customer Relationship Management Hard Drive PowerPoint Wireless Legal Mobility Proactive IT Website Regulations Computer Repair Running Cable Vendor Administration Current Events Patch Management SaaS End of Support Private Cloud Scam Hosted Solution Robot Cortana Securty Telephony Fax Server Machine Learning Telephone Systems Digital Net Neutrality Websites Black Market Chrome Business Intelligence Excel User Digital Payment Cryptocurrency Software as a Service Monitoring Router Virtual Desktop Business Growth Social Employee/Employer Relationship Comparison Tablet Google Maps DDoS Management Company Culture Social Engineering Cooperation Social Networking Vulnerabilities Paperless Office Sports Disaster Meetings Word Download eWaste Inbound Marketing Redundancy Solutions Employees IT service Streaming Media Professional Services Microchip Taxes Lifestyle Evernote Distribution Distributed Denial of Service Processors Virtual Assistant Pain Points Integration Bluetooth USB Tech Terms Presentation Cost Public Cloud Licensing Start Menu Mobile Technology Managed Services Provider Identity Theft Google Docs Specifications Safety Memory Uninterrupted Power Supply Experience Computer Accessories Notifications How To Gaming Console Monitors Managed Services Documents Vulnerability Cleaning Virtual Reality Smart Devices Office Tips Multi-factor Authentication Trending Managed IT Service Entertainment Politics Bitcoin Teamwork Heating/Cooling Data Protection Mouse Text Messaging Emails Telephone Webcam Automobile Chromebook YouTube Video Conferencing Computing Infrastructure Hack Downloads Statistics Processor Unified Communications Settings Programming Co-managed IT User Error Network Congestion How To Service Level Agreement User Tip Proactive Maintenance Public Speaking Web Server Assessment Internet Service Provider SharePoint Startup Asset Tracking Smart Phones Security Cameras Threats Cabling Webinar AI Business Cards Shortcut Administrator IT Assessment Google Calendar Username Navigation Virtual Machine Books Workers Permissions Regulations Compliance Tip of the week Unified Threat Management Language Backup and Disaster Recovery VoIP Recycling Gamification Data Analysis Adminstration Pirating Information Troubleshooting Supercomputer Touchscreen Remote Working News Screen Reader Customer Resource management Analytic Leadership eCommerce Entrepreneur Music Supply Chains Piracy Upload Printers SQL Server HIPAA Consultation switches Writing Smart Tech Product Reviews GDPR Managing Risk Environment Worker Knowledge Competition Electronic Health Records Technology Tips Upgrades HTML Tech Hypervisor Electronic Payment Reading Samsung Financial Data Fiber-Optic Database Read G Suite Memes Audit Mobile Security Fileless Malware Hybrid Cloud Business Owner Employer Employee Relationship Best Practives LiFi Fake News Telephone System Holidays 2FA Software License Device Management Trends Proxy Server Azure IP Address Hacks Physical Security Managing IT Services Data Warehousing Multi-Factor Security Modem Strategy Transportation Application Banking Botnet Microserver Access Surveillance Deep Learning Devices Business Managemenet Term Human Resources Relocation Tablets Emergency Telework Hard Drive Disposal Fraud Work/Life Balance Tactics Content Management Electronic Medical Records Upselling Sync IT Computer Care UTM Content Directions Display Video Surveillance Visible Light Communication Remote Workers Microsoft Excel Recording Optimization Remote IT Plan Enterprise Resource Planning online Currency Dark Web Free Resource CCTV Get More Done Google Drive IT consulting Virtual Private Network Windows Server 2008 Legislation Error SSID Saving ZTime Health IT Digital Signature Business Metrics Computer Malfunction Turn Key Spyware Development Mobile Payment Accountants A.I. Processing Reliable Computing Printer Server FinTech email scam Addiction In Internet of Things Electricity CIO Printing LinkedIn Wasting Time Debate Trojan Advertising Data Storage Flash Harddrive Logistics Virtual Machines Staffing Google Wallet Migration Connected Devices Bookmark GPS Windows XP Procurement Wireless Headphones Cyber security Organize Employer/Employee Relationships Motion Sickness cache Television Displays Equifax Fleet Tracking Skype External Harddrive Google Play Telephone Service PDF Scalability Society Organization Network Management Archive Best Available Keyboard WannaCry Communitications Micrsooft Device security MSP Managing Costs Messenger Tracking PCI DSS Microsoft 365 Corporate Profile Drones Desktop Finance Browsers 3D Ebay Domains Rental Service Time Management Supply Chain Management Freedom of Information Nanotechnology Point of Contact Social Network Medical IT Thin CLient Trend Micro CrashOverride Capital Managing Stress Regulation Productuvuty 3D Printing Reviews Personal Information Financial

toner1