Let us be your IT department!
Call us Today! (703) 821-8200

Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: A URL Can Help Give Away A Phishing Attack

b2ap3_large_phishing_status_400

Back in 1995, scammers pulled the first phishing attack. They took the identity of AOL employees and requested the billing information of users through instant messaging. More sophisticated phishing attempts have evolved over the years, culminating in the commonly-seen email phishing attack, which tricks users into handing over personal or sensitive information. Phishing attacks can be seen through, so we’ll show you how you can identify threats before they become a problem.

How Phishing Emails Work
Above everything else, a phishing email needs to be convincing it if wants to trick anyone into opening it. For example, if you received an email from the bank filled to the brim with misspellings and blocked images, would you trust them? Phishing attempts have become more elaborate and more difficult to identify, as hackers understand that detail is important to trick users. Still, if you look closely, you’ll be able to identify a real message from a fake message designed to steal your information. In particular, you can check a URL for legitimacy.

The Tricks of Malicious URLs
Phishing attacks will typically require that the user clicks on a URL found in the phony email. They will then be redirected to a website that asks for their credentials. Most users who don’t know better will click on the link and not think twice about where it leads. Hackers understand this and try to distract them from caring by using strong language, urging them to take immediate action. This is how deceptive URLs try to succeed, but there is one fatal flaw in this tactic.

Avoiding Phishing Attempts
Phishing emails show all sorts of warning signs that you can identify if you’re observant. First, take note of any links that are in the message. Do NOT click them without first checking if they are legitimate. Hover over the link and see where it goes. Again, be extra careful to only hover over it and not click it. You should see where the URL goes, and if it’s not to the domain that it claims to be from, just avoid it. For example, if an email claims to be from paypal and wants you to click a link, the link should go to paypal.com--not payypal.com. Such an event could very well be a scam that wants to steal your username and password.

In other words, it’s a matter of common sense. Does the link look like it makes sense in the context of the sender?

If the answer is no, you’re probably staring at a phishing email. Don’t click the link, as it could perform any number of functions, from taking you to a malicious website or instigating a download of malicious files. Regardless, the end result will surely be detrimental to your organization and its network security.

Computerware can keep your network from suffering these types of breaches. To learn more about how we can keep phishing messages out of your inbox and monitor your network in real time for data breaches. To learn more, reach out to us at (703) 821-8200.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Workplace Tips Productivity Software Backup Business Computing Hackers Data Saving Money Hardware Business Malware IT Support Email IT Services Hosted Solutions Efficiency Google Quick Tips Smartphones Gadgets Business Continuity Small Business Mobile Devices Mobile Office Disaster Recovery Computer User Tips Virtualization Microsoft Office Server Network Network Security Miscellaneous Upgrade Windows 10 VoIP Social Media Windows Unified Threat Management Mobile Device Management Smartphone Innovation Operating System BYOD Android Communication WiFi Remote Computing Vendor Management Passwords Ransomware Apps The Internet of Things Mobile Computing Marketing Remote Monitoring Facebook Users History Holiday Managed IT services Firewall Data Management Analytics Apple Collaboration Alert IT Consultant Save Money Automation Content Filtering Big data Bring Your Own Device Outsourced IT Office Health Managed IT Services Virus Phishing Hiring/Firing App Best Practice Going Green BDR Spam Windows 8 Wireless Technology Tech Support Search Lithium-ion Battery Outlook Hard Drives Productivity Help Desk Antivirus Internet of Things Phone System Encryption Gmail Information Technology IBM Recovery Browser Employer-Employee Relationship Data Backup Printer IT Support Budget Managed IT Proactive IT Maintenance Administration SaaS Computers Save Time Money Bandwidth Artificial Intelligence Running Cable Humor Saving Time communications Data storage Customer Service Education PowerPoint Social Networking Hacking Hosted Solution VPN Twitter Data Recovery Office 365 User iPhone Black Market Business Intelligence DDoS Government Networking Document Management Fax Server Mobile Device Word Telephone Systems Risk Management Computer Repair Training Password Hacker Intranet It Management Avoiding Downtime Securty Tablet Hard Drive Solid State Drive Update Flexibility Current Events Two-factor Authentication Wireless Digital Payment Travel Website Windows 10 Legal Paperless Office Taxes Webcam Experience Sports Text Messaging Uninterrupted Power Supply Computing Robot IT service Compliance Safety Social Net Neutrality Co-managed IT Cloud Computing Hack Network Congestion Business Growth Telephony Monitors Lifestyle Cybercrime Trending YouTube Settings Cortana Cost Management Disaster Statistics End of Support Public Cloud Downtime Processors Cybersecurity USB Law Enforcement Streaming Media Politics Presentation Company Culture Inbound Marketing Virtual Desktop Mobility Pain Points Automobile Documents Programming Chrome Excel User Error Heating/Cooling Laptop Router How To Computer Accessories Customer Relationship Management Office Tips Gaming Console Comparison Augmented Reality Start Menu Retail Access eWaste Read Society Mouse Best Practives Software as a Service Shortcut Hacks Samsung Value Micrsooft G Suite Microserver GPS Relocation Troubleshooting Spyware Environment Identity Theft Physical Security Staffing Competition Notifications Tablets Sync Turn Key Ebay 3D Reliable Computing Data Protection Business Owner cache Virtual Reality CCTV Music Recycling Trojan Organize Patch Management Application Social Engineering Google Maps Upgrades Bluetooth In Internet of Things LiFi Pirating Information Adminstration Corporate Profile Specifications Assessment Computing Infrastructure Emails Redundancy Rental Service Digital Signature Deep Learning Scalability Memory Visible Light Communication Content Management VoIP Entertainment Consultation Wi-Fi Meetings Project Management Cabling Private Cloud Flash Administrator Analytic Advertising Video Surveillance Saving ZTime Supercomputer Google Wallet LinkedIn Harddrive Emergency Public Speaking Worker Displays Machine Learning Distributed Denial of Service Unified Communications Archive External Harddrive Debate Google Drive Entrepreneur Banking Employer Employee Relationship Drones Business Managemenet Point of Contact File Sharing Licensing HIPAA Electronic Payment Language Botnet Permissions Smart Phones Get More Done Electricity Thin CLient Business Metrics Printer Server switches Business Technology IP Address Writing Computer Malfunction Human Resources WannaCry Leadership Time Management Chromebook Skype Scam Messenger Work/Life Balance Motion Sickness Cryptocurrency Device Management Touchscreen Download Tracking Teamwork Google Docs Upselling Webinar IT consulting Knowledge Books Storage PDF Web Server Cleaning online Currency Digital Websites Keyboard Microchip Workers Best Available CIO Product Reviews Windows XP Tech Terms Domains Reading Regulations Capital Productuvuty Vulnerability CrashOverride 3D Printing

hp supplies medallionLarge2017