facebook linkedin twitter

Computerware Blog

Tip of the Week: Phishing Training Has to Be a Priority

Tip of the Week: Phishing Training Has to Be a Priority

When reading through Microsoft’s latest Security Intelligence Report you will quickly get the notion that phishing attacks are some of the most prevalent cyberattacks. With businesses forced to use technology to support a remote workforce, this is definitely still relevant information. It, then, becomes extremely important that your business does a quality job of training your employees to spot phishing attempts before they become a problem. Let’s take you through some of the telltale signs that you have received a phishing message.

1. High Anxiety

When reading a phishing email, a lot of the time the message often paints a picture of a situation that won’t end well for the reader unless the reader acts immediately. For many people this is enough to make them click on links and open attachments they have no businesses interacting with. The phishing attack is that much more effective when it is seemingly from a legitimate source. If the contents of an email don’t sit right with you, and you don’t immediately identify the address it is sent from, it is a phishing attack and needs to be reported to your company’s IT administrator. 

2. It’s In Disguise

Hackers are known to send attachments with their phishing attacks. These attachments, if interacted with, will often disperse malware. This can be completely devastating to a business’ network security. If you don’t immediately recognize the sender of the email, don’t click on any attachments unless you first verify it came from a friendly sender.

3. Fake URLs

If you couldn’t tell by the tone and content of the message, the best way to tell if you are dealing with a phishing attack is to check the URLs of the links embedded in the message. If you mouse over any hyperlink, you can quickly check the URL in the status bar. If you don’t recognize it, don’t click on it, and immediately report it to your IT administrator.

4. The Message is Impersonal

Most marketing emails nowadays are crafted by trained marketers to give the reader the sense of importance. Since a company's brand means more now than ever, a legitimate marketing message will seem personalized and deliberate. A phishing email staged to look like a marketing email, however lacks this touch. So, if you get an email that looks like a marketing message, but the letter has grammatical errors, misspellings, or if the tone seems desperate, you're probably being phished.

This isn’t a comprehensive list--there are plenty more ways to tell that an email is a phishing attempt--but it should help you get your staff in the right mindset to not engage with phishing attacks. If you would like more information about phishing and the security measures you can take to keep from being a victim, reach out to Computerware today at (703) 821-8200.

There’s a Right Way to Work Remotely, and a Not-So...
Pandemics Stimulate Innovation


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, May 27, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Hosted Solutions Business Productivity Email Productivity Malware IT Services Saving Money Efficiency Google Computer User Tips Small Business Innovation IT Support Data Backup Smartphones VoIP IT Support Collaboration Mobile Devices Quick Tips Network communications Business Continuity Microsoft Office Gadgets Android Data Recovery Social Media Disaster Recovery Upgrade Cybersecurity Mobile Office Server Communication Virtualization Smartphone Miscellaneous Phishing Mobile Device Management Vendor Management Holiday Ransomware Windows Passwords Outsourced IT Operating System Tech Term Windows 10 Managed IT Services Mobile Device Internet of Things Apps Facebook Users Unified Threat Management Remote Monitoring BDR Automation Data Management Analytics BYOD Managed IT services Remote Computing Apple Mobile Computing WiFi Windows 10 The Internet of Things Cloud Computing Marketing History Artificial Intelligence Firewall Training Browser Save Money Help Desk Alert Encryption App Big data Spam Health Office 365 IT Consultant Two-factor Authentication Bandwidth Office Business Technology Information Technology Going Green Hard Drives Budget Bring Your Own Device Gmail Antivirus Managed IT Government Maintenance Cybercrime Access Control Printer Windows 7 Content Filtering Managed Service Hiring/Firing Wireless Technology Saving Time Computers Information Windows 8 Outlook VPN Search Recovery Healthcare Employer-Employee Relationship Retail Tech Support Virus Lithium-ion Battery Best Practice Cost Management Blockchain IBM Money Data Loss Phone System Document Management Augmented Reality Computing Customer Service Project Management Travel Education Humor Update iPhone It Management Networking Hacking Mobility Hacker Patch Management Downtime Regulations Conferencing Customer Relationship Management Current Events SaaS Computer Repair Running Cable Data Breach PowerPoint Proactive IT Administration Wireless Law Enforcement Twitter Intranet Compliance Storage Website Solid State Drive Data storage Flexibility Avoiding Downtime Risk Management File Sharing Covid-19 Value Hard Drive Password Data Security Applications Legal Save Time Excel Router Social Engineering Comparison Tablet Scam Paperless Office Sports Voice over Internet Protocol Company Culture Meetings User Monitoring Disaster Virtual Desktop End of Support Social Networking Private Cloud Hosted Solution Robot Wi-Fi Social Digital Telephony Websites Management Securty Machine Learning DDoS Fax Server Vulnerabilities Telephone Systems Cooperation Software as a Service Vendor Remote Work Black Market Cryptocurrency Word Net Neutrality Laptop Business Intelligence Cortana Business Growth Digital Payment Google Maps Office Tips Politics Professional Services Virtual Reality Downloads Emails Automobile Processors Computer Accessories YouTube Integration Chromebook USB Trending Presentation Redundancy Smart Devices Unified Communications Settings Computing Infrastructure Hack Co-managed IT Gaming Console How To User Error Mouse Managed Services Provider Evernote Specifications Safety Download Webcam Statistics Virtual Assistant Text Messaging Programming IT service Network Congestion Documents Multi-factor Authentication Teamwork Heating/Cooling Managed Services Telephone Entertainment Employee/Employer Relationship Start Menu Tech Terms Lifestyle Microchip Taxes Distributed Denial of Service Managed IT Service Mobile Technology Bluetooth Streaming Media Public Cloud Licensing Uninterrupted Power Supply Inbound Marketing Vulnerability Processor Google Docs Bitcoin Memory Identity Theft eWaste Pain Points Data Protection Experience Chrome Monitors Distribution Cleaning CIO Remote Workers HTML HIPAA eCommerce IT Advertising Flash Fiber-Optic Database In Internet of Things Data Analysis Environment Employees WannaCry Trojan GDPR Competition Managing Risk Time Management Freedom of Information Organize Windows XP Upselling Telephone System Electronic Payment SQL Server Corporate Profile Staffing Virtual Private Network Google Wallet Mobile Security online Currency Hypervisor Assessment SharePoint Displays Multi-Factor Security Cost Scalability Business Owner Development Society Video Surveillance Software License Trends Motion Sickness Tech Micrsooft Saving ZTime Devices LinkedIn Messenger Tracking IP Address Holidays Tip of the week Fraud Tactics Fileless Malware Hybrid Cloud Google Calendar Rental Service Modem Application Strategy Touchscreen News Proxy Server Azure Human Resources VoIP Procurement Drones UTM Content Term Consultation Webinar Harddrive Legislation Skype Error Cabling Electronic Medical Records Transportation Knowledge Video Conferencing Debate IT Plan Archive Enterprise Resource Planning Web Server Accountants A.I. Books Workers Recording Optimization Communitications Permissions GPS Language email scam Addiction Administrator Directions Display Technology Tips Supercomputer Digital Signature SSID How To Fake News Point of Contact Dark Web Free Resource Audit Supply Chain Management External Harddrive Processing Data Warehousing switches Writing Wireless Headphones Worker Health IT Internet Service Provider Music Migration Connected Devices Upgrades Thin CLient Equifax Fleet Tracking Reading Samsung Logistics Virtual Machines Emergency Hard Drive Disposal IT Assessment 3D Ebay Network Management Wasting Time Access Recycling Device security MSP Employer Employee Relationship Cyber security Microsoft Excel LiFi Analytic G Suite Bookmark PDF Computer Care Best Practives Remote Working Smart Phones Best Available Google Play Keyboard Telephone Service Google Drive Windows Server 2008 Nanotechnology Product Reviews Social Network Employer/Employee Relationships Desktop Finance Hacks Physical Security Mobile Payment Deep Learning Leadership Startup Asset Tracking Relocation Tablets Microsoft 365 Domains Microserver Electronic Health Records Adminstration Work/Life Balance Pirating Information Business Cards Service Level Agreement Read Banking Botnet Managing Costs Spyware Username Medical IT Public Speaking Trend Micro Memes Visible Light Communication Unified Threat Management Backup and Disaster Recovery Sync Browsers Electricity Printing Security Cameras Shortcut Threats IT consulting Screen Reader Customer Resource management User Tip Proactive Maintenance Get More Done Managing IT Services Device Management Gamification Notifications CCTV cache Television Printer Server Smart Tech Business Managemenet Reliable Computing Troubleshooting Solutions Turn Key Surveillance Piracy Content Management Upload Business Metrics Computer Malfunction Navigation Entrepreneur Virtual Machine Printers Managing Stress Regulation CrashOverride Capital Personal Information Productuvuty Financial 3D Printing