Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: A URL Can Help Give Away A Phishing Attack


Back in 1995, scammers pulled the first phishing attack. They took the identity of AOL employees and requested the billing information of users through instant messaging. More sophisticated phishing attempts have evolved over the years, culminating in the commonly-seen email phishing attack, which tricks users into handing over personal or sensitive information. Phishing attacks can be seen through, so we’ll show you how you can identify threats before they become a problem.

How Phishing Emails Work
Above everything else, a phishing email needs to be convincing it if wants to trick anyone into opening it. For example, if you received an email from the bank filled to the brim with misspellings and blocked images, would you trust them? Phishing attempts have become more elaborate and more difficult to identify, as hackers understand that detail is important to trick users. Still, if you look closely, you’ll be able to identify a real message from a fake message designed to steal your information. In particular, you can check a URL for legitimacy.

The Tricks of Malicious URLs
Phishing attacks will typically require that the user clicks on a URL found in the phony email. They will then be redirected to a website that asks for their credentials. Most users who don’t know better will click on the link and not think twice about where it leads. Hackers understand this and try to distract them from caring by using strong language, urging them to take immediate action. This is how deceptive URLs try to succeed, but there is one fatal flaw in this tactic.

Avoiding Phishing Attempts
Phishing emails show all sorts of warning signs that you can identify if you’re observant. First, take note of any links that are in the message. Do NOT click them without first checking if they are legitimate. Hover over the link and see where it goes. Again, be extra careful to only hover over it and not click it. You should see where the URL goes, and if it’s not to the domain that it claims to be from, just avoid it. For example, if an email claims to be from paypal and wants you to click a link, the link should go to Such an event could very well be a scam that wants to steal your username and password.

In other words, it’s a matter of common sense. Does the link look like it makes sense in the context of the sender?

If the answer is no, you’re probably staring at a phishing email. Don’t click the link, as it could perform any number of functions, from taking you to a malicious website or instigating a download of malicious files. Regardless, the end result will surely be detrimental to your organization and its network security.

Computerware can keep your network from suffering these types of breaches. To learn more about how we can keep phishing messages out of your inbox and monitor your network in real time for data breaches. To learn more, reach out to us at (703) 821-8200.

Your Vendors Are A Huge Asset, Unless They’re Mism...
Best Practices for Data Backup and Disaster Recove...

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Managed Service Provider Workplace Tips Business Computing Productivity Backup Hackers Data Saving Money Hardware Business Malware IT Support Email IT Services Hosted Solutions Google Efficiency Quick Tips Small Business Gadgets Smartphones Business Continuity Mobile Devices Mobile Office Computer Disaster Recovery User Tips Network Security Network Virtualization Server Microsoft Office VoIP Miscellaneous Upgrade Windows 10 Social Media Unified Threat Management Mobile Device Management Windows Ransomware Android Smartphone Operating System Remote Computing Passwords Innovation WiFi Vendor Management BYOD Remote Monitoring Communication Apps Holiday Mobile Computing Marketing The Internet of Things Facebook Users History Collaboration Firewall Managed IT services Analytics Apple Data Management Save Money Outsourced IT Alert IT Support IT Consultant Automation Productivity Bring Your Own Device Office Big data Health Content Filtering Managed IT Services Phishing Windows 8 Wireless Technology Browser Search Tech Support Lithium-ion Battery communications Budget Managed IT Outlook Hard Drives Virus Artificial Intelligence App Best Practice Going Green Hiring/Firing BDR Spam Gmail Encryption Recovery Printer Employer-Employee Relationship Update Help Desk Data Backup Antivirus Maintenance Cybersecurity Phone System Internet of Things Information Technology IBM Running Cable Document Management Mobile Device Government Saving Time Humor Law Enforcement Data storage Customer Service Proactive IT Travel Computers Legal Administration Education It Management SaaS Save Time Money Bandwidth Windows 10 Black Market Computer Repair Fax Server DDoS Networking Intranet Word Telephone Systems Training Data Recovery Risk Management Password Avoiding Downtime Cost Management Disaster Hacker Digital Payment Current Events Securty Tablet Solid State Drive Flexibility Two-factor Authentication PowerPoint Wireless Social Networking Website VPN Twitter Hard Drive Hacking iPhone Hosted Solution Business Intelligence Mobility Office 365 User How To Safety Social Trending Lifestyle Network Congestion Start Menu Business Growth Taxes Statistics Telephony Monitors Software as a Service Access Control Uninterrupted Power Supply Cybercrime Streaming Media YouTube Settings Unified Communications Cortana Inbound Marketing Google Maps End of Support Patch Management Pain Points Downtime Chrome Processors USB Cloud Computing User Error Router Politics Presentation Excel Company Culture Hack Computer Accessories Comparison Customer Relationship Management Virtual Desktop Augmented Reality Project Management Documents Gaming Console Programming Heating/Cooling Google Docs Laptop Webcam Text Messaging Office Tips Public Cloud Retail Paperless Office Experience Sports Computing Net Neutrality Robot Automobile IT service Scam Co-managed IT Compliance Knowledge LiFi Video Surveillance Specifications Bluetooth Saving ZTime Computing Infrastructure Technology Tips Digital LinkedIn Web Server Workers Rental Service Digital Signature Deep Learning Websites Tech Terms Harddrive Visible Light Communication Archive Debate Entertainment Memory Wi-Fi Access Mobile Technology Samsung Point of Contact External Harddrive Analytic Advertising G Suite Flash Thin CLient Google Wallet Spyware Mobile Payment Physical Security Tablets Get More Done Public Speaking Displays Smart Phones Data Security Data Protection Printer Server Sync Leadership Entrepreneur Banking Drones cache CCTV Business Managemenet File Sharing HIPAA Electronic Payment Language Data Loss Permissions Corporate Profile In Internet of Things Device Management Business Metrics Assessment Emails switches Scalability IP Address Writing Redundancy Data Breach Upselling VoIP Webinar online Currency Human Resources Chromebook Consultation Meetings Skype Cabling Private Cloud Messenger Work/Life Balance Audit Cryptocurrency Administrator Mouse Download Teamwork Supercomputer IT consulting Worker Best Practives Machine Learning Books GPS Storage Emergency PDF Computer Care Cleaning Distributed Denial of Service Keyboard Microchip Best Available Google Drive Microserver CIO Employer Employee Relationship Product Reviews Windows XP Licensing Ebay Domains Reading 3D Regulations eWaste Printing Read Society Electricity Botnet Recycling Shortcut Hacks Value Micrsooft Turn Key Trojan Pirating Information Relocation Adminstration Troubleshooting Business Technology Environment Identity Theft Downloads WannaCry Organize Computer Malfunction Staffing Competition Notifications Time Management Content Management Reliable Computing Business Owner Virtual Reality Google Calendar Music Motion Sickness Application Social Engineering Upgrades Touchscreen Tracking Television Capital 3D Printing Productuvuty Vulnerability CrashOverride

hp supplies medallionLarge2017