Let us be your IT department!
Call us Today! (703) 821-8200

 

 

Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: A URL Can Help Give Away A Phishing Attack

Tip of the Week: A URL Can Help Give Away A Phishing Attack

Back in 1995, scammers pulled the first phishing attack. They took the identity of AOL employees and requested the billing information of users through instant messaging. More sophisticated phishing attempts have evolved over the years, culminating in the commonly-seen email phishing attack, which tricks users into handing over personal or sensitive information. Phishing attacks can be seen through, so we’ll show you how you can identify threats before they become a problem.

How Phishing Emails Work
Above everything else, a phishing email needs to be convincing it if wants to trick anyone into opening it. For example, if you received an email from the bank filled to the brim with misspellings and blocked images, would you trust them? Phishing attempts have become more elaborate and more difficult to identify, as hackers understand that detail is important to trick users. Still, if you look closely, you’ll be able to identify a real message from a fake message designed to steal your information. In particular, you can check a URL for legitimacy.

The Tricks of Malicious URLs
Phishing attacks will typically require that the user clicks on a URL found in the phony email. They will then be redirected to a website that asks for their credentials. Most users who don’t know better will click on the link and not think twice about where it leads. Hackers understand this and try to distract them from caring by using strong language, urging them to take immediate action. This is how deceptive URLs try to succeed, but there is one fatal flaw in this tactic.

Avoiding Phishing Attempts
Phishing emails show all sorts of warning signs that you can identify if you’re observant. First, take note of any links that are in the message. Do NOT click them without first checking if they are legitimate. Hover over the link and see where it goes. Again, be extra careful to only hover over it and not click it. You should see where the URL goes, and if it’s not to the domain that it claims to be from, just avoid it. For example, if an email claims to be from paypal and wants you to click a link, the link should go to paypal.com--not payypal.com. Such an event could very well be a scam that wants to steal your username and password.

In other words, it’s a matter of common sense. Does the link look like it makes sense in the context of the sender?

If the answer is no, you’re probably staring at a phishing email. Don’t click the link, as it could perform any number of functions, from taking you to a malicious website or instigating a download of malicious files. Regardless, the end result will surely be detrimental to your organization and its network security.

Computerware can keep your network from suffering these types of breaches. To learn more about how we can keep phishing messages out of your inbox and monitor your network in real time for data breaches. To learn more, reach out to us at (703) 821-8200.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 20 July 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Workplace Tips Managed Service Provider Productivity Software Business Computing Backup Hackers Saving Money Hardware Data Business Malware Email IT Support Hosted Solutions IT Services Quick Tips Google Smartphones Gadgets Efficiency Mobile Devices Disaster Recovery Small Business Mobile Office Virtualization Business Continuity Computer Network Microsoft Office User Tips Social Media Network Security Server Miscellaneous Upgrade VoIP Windows 10 Unified Threat Management Mobile Device Management Windows Innovation Smartphone WiFi Passwords Operating System Remote Computing BYOD Communication The Internet of Things Vendor Management Marketing Mobile Computing Apps Ransomware Users History Holiday Firewall Managed IT services Android Facebook Remote Monitoring Analytics Apple Collaboration Alert Data Management Save Money IT Consultant Health Bring Your Own Device Automation Office Big data Content Filtering Going Green Spam Tech Support Hiring/Firing Phishing Wireless Technology Outsourced IT Lithium-ion Battery Hard Drives App Windows 8 Best Practice BDR Printer IBM Gmail Search Browser Outlook Employer-Employee Relationship Productivity Virus Budget Phone System Internet of Things Information Technology Save Time Money Saving Time Running Cable Managed IT Services Data storage Administration Maintenance Proactive IT Help Desk Computers Customer Service Bandwidth Education Encryption Humor Telephone Systems Hacking Training Networking Document Management Mobile Device Office 365 Avoiding Downtime Computer Repair User Current Events IT Support Hard Drive Intranet Managed IT Government Recovery Solid State Drive Update Flexibility Legal Risk Management Password Digital Payment Hacker communications Tablet PowerPoint Social Networking SaaS Antivirus Two-factor Authentication Hosted Solution Twitter Wireless Website Artificial Intelligence Travel Fax Server iPhone Black Market Business Intelligence Business Growth Monitors Settings Public Cloud YouTube Cybersecurity Safety Pain Points Statistics Politics End of Support Social Excel User Error DDoS Law Enforcement Network Congestion Streaming Media Automobile Inbound Marketing Cybercrime Gaming Console How To Word Webcam Chrome Cortana Laptop Router Cost Management Paperless Office Taxes Computer Accessories Customer Relationship Management Processors Office Tips Comparison Downtime USB Augmented Reality Uninterrupted Power Supply Computing Presentation Company Culture Sports Virtual Desktop Text Messaging IT service VPN Programming Robot Documents Co-managed IT Heating/Cooling Cloud Computing Compliance Lifestyle Hack Net Neutrality Retail Experience Supercomputer Troubleshooting Worker Staffing Machine Learning Environment Competition Advertising Smart Phones Get More Done Video Surveillance WannaCry Distributed Denial of Service Saving ZTime Banking Employer Employee Relationship Google Wallet LinkedIn Business Owner Printer Server Trending File Sharing Licensing Displays Application Unified Communications Archive Debate Digital Language Botnet Business Metrics Drones Specifications Disaster Point of Contact Permissions Digital Signature Access Computer Malfunction Thin CLient Chromebook Mobility Upselling Entertainment Securty Webinar Messenger Writing switches Motion Sickness Spyware Work/Life Balance Leadership Download Tracking Analytic Books Windows 10 Web Server Public Speaking Cryptocurrency Best Practives Device Management Cache Microchip Workers Google Docs IT consulting Microserver Reading Start Menu Regulations Entrepreneur Cleaning online Currency HIPAA Business Managemenet Vendor Mangement Hacks Samsung Electronic Payment CIO Windows XP Turn Key Relocation G Suite Identity Theft Physical Security IP Address Society Trojan Mouse Business Mangement Notifications Tablets Human Resources Micrsooft Organize Reliable Computing Data Protection GPS Sync Virtual Reality CCTV Skype IT Management Social Engineering Google Maps Teamwork Ebay Scalability Corporate Profile 3D Bluetooth In Internet of Things Computing Infrastructure Emails Music Storage Recycling Google Drive Rental Service Upgrades PDF Keyboard LiFi Best Available Pirating Information VoIP Adminstration Memory Wi-Fi Meetings Domains Harddrive Product Reviews Read Telephony Cabling Deep Learning Private Cloud eWaste Shortcut Visible Light Communication External Harddrive Content Management Value Electricity Flash Administrator

hp supplies medallionLarge2017