Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

How to Avoid the Influence of a Phishing Scam

How to Avoid the Influence of a Phishing Scam

Phishing emails are a real problem for today’s businesses, which makes it critically important that you and your team can identify them as they come in. Let’s touch on a few reliable indicators that a message isn’t a legitimate one.

What Makes Phishing Attacks So Bad?

One of the largest threats inherent in a phishing scam is that there is a relatively low barrier for entry. There’s a tendency to romanticize hackers somewhat, picturing them in dark rooms lit only by an array of computer monitors as their fingers dance across their keyboard. While cinematic, this imagery is grossly inaccurate. In truth, hacking has trended more towards the psychological, focusing on user manipulation over fancy programming skills.

Which sounds easier to you, learning how to pick a lock, or asking someone for their keys?

Phishing attacks are not only easier on the cybercriminal, they’re also effective. It’s easy to be fooled by a legitimate-looking email or website, especially when you aren’t anticipating being scammed.

Let’s say someone poses as your bank. At first glance, there may be every indication that the email they send is legitimate. A quick look at the sender’s address may pass muster, the bank’s logo and contact information may be present, even any filters you have set up to organize your emails may work.

At a glance, all may be in order… which is exactly how many phishing emails will get you.

While phishing emails themselves aren’t usually dangerous, they contain links to risky and insecure websites or have nefarious files attached to them. Generally, these elements are where the danger lies.

Spotting a Phishing Attack

Let’s go through a step-by-step process to check any email that you may receive. The first sign of phishing can be found in its tone: if it has a too-good-to-be-true offer, is overly urgent, or is requesting information about one of your accounts unprompted, you’re right to be suspicious.

Check all links to confirm they direct to a legitimate URL. DON’T CLICK THEM. For example, if the email were from Amazon, links would most likely lead back to amazon-dot-com. However, anything added between “amazon” and “dot-com” is a sign of trouble. Furthermore, the dot-com should be immediately followed by a forward slash (/).

Let’s go through a few examples to demonstrate how important the little details of a URL can be, using PayPal as our subject.

  • paypal.com - Safe
  • paypal.com/activatecard - Safe
  • business.paypal.com - Safe
  • business.paypal.com/retail - Safe
  • paypal.com.activatecard.net - Suspicious! (notice the dot immediately after PayPal’s domain name)
  • paypal.com.activatecard.net/secure - Suspicious!
  • paypal.com/activatecard/tinyurl.com/retail - Suspicious! Don’t trust dots after the domain!

Check how the email address appears in the header. If you ever receive an email from Google, the address isn’t going to be “gooogle@gmail-dot-com”. If you’re unsure, throw any email addresses into a quick search for legitimacy.

Be wary of any attachments. As we mentioned above, most email-borne threats are going to be transmitted as an infected attachment, or as a link to a malicious website. If an incoming email has either a link or an attachment, exercise caution.

Don’t take password alerts at face value. Some scammers will use phishing emails to steal your credentials. Stating that your password has been stolen or some similar breach has occurred, the email will prompt you to supply your password—springing the trap.

If all this sounds like we’re telling you to wonder if any of your emails are legitimate, it’s because we are, in a way. With a healthy sense of skepticism, email and email correspondence can be very useful business tools. Many phishing attempts can also be weeded through with a reliable spam-blocker as well.

Want us to assist you with your email security? Call up our team of professionals by dialing 1-844-237-4300.

Google and Apple Pushed a COVID-19 Exposure Notifi...
A Brief Guide to Leading a Company During COVID-19
 

By accepting you will be accessing a service provided by a third-party external to https://www.centraltechnologysolutions.com/

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Network Security Privacy Hosted Solutions IT Services Email Data Backup Internet Malware Hackers IT Support Efficiency Software Business Innovation Outsourced IT Microsoft Data Recovery Hardware Computer Mobile Devices Productivity Google Managed IT Services Upgrade Business Continuity Smartphone Small Business Cybersecurity IT Support Cloud Computing Phishing Backup Collaboration User Tips Mobile Device Disaster Recovery Ransomware Communication Workplace Tips Business Management Tech Term Managed Service Provider VoIP Managed IT Services Windows 10 Android Managed Service Internet of Things Quick Tips Smartphones Social Media Paperless Office Data Management Covid-19 Network Browser Encryption Remote Monitoring communications Facebook Saving Money Managed IT BDR Office 365 Artificial Intelligence Windows 10 Windows Remote Work Server Save Money Business Technology Miscellaneous Virtualization Help Desk Wi-Fi Users Chrome Compliance Risk Management Holiday BYOD Apps Document Management Passwords Password Training Analytics Mobile Device Management Windows 7 Health Office Microsoft Office Government Automation Healthcare Vendor Management App Big Data Data Security Robot Bandwidth Firewall Blockchain Laptops Money Unified Threat Management Gmail Content Filtering Recovery Bring Your Own Device Employer-Employee Relationship Going Green Applications Avoiding Downtime Data loss Vulnerability Two-factor Authentication Mobility Information Mobile Office File Sharing Telephone Systems SaaS Regulations Apple Hosted Solution Processor Files IT Management Website Redundancy Computers Tip of the week Storage Scam Antivirus Data storage Project Management Computing Infrastructure Information Technology Wireless Gadgets Software as a Service Customer Service Router Maintenance Hard Drive Unified Communications Virtual Reality Remote Computing Machine Learning Settings IoT WiFi Tablet Downtime OneDrive Meetings IT Service Social Company Culture RMM Access Control Proactive Politics VPN Work/Life Balance Budget Employee-Employer Relationship Flexibility Customer Relationship Management Operating System Virtual Private Network Printing The Internet of Things Mouse Remote Workers Network Management Outlook File Management Assessment Upgrades How To Google Drive Smart Technology Server Management Net Neutrality Twitter Spam Payment Cards Business Growth Uninterrupted Power Supply Consultation YouTube Electronic Health Records Co-Managed IT Display Internet Exlporer Monitoring End of Support Mobile Computing Employees Hacker Word Search Administration Professional Services Managed Services HIPAA Education Cooperation Solid State Drive Recycling LiFi Monitors Private Cloud Mobile Security Alert Wireless Technology Legal Utility Computing Consulting Data Storage Electronic Medical Records Current Events Tech Support IT solutions Instant Messaging Remote Worker Digital Payment How To Samsung Managed Services Provider Websites Identity Theft Patch Management Sports Time Management Networking Remote Monitoring and Management Augmented Reality Licensing Bitcoin Management Dark Web Chromebook Remote Social Network Data Breach Botnet Smart Tech Black Market Connectivity Database Sensors Travel Migration Vulnerabilities Authentication Database Management Shadow IT Emoji Disaster Trending WPA3 Financial Notes Mobile Device Managment Operations Software Tips Windows 8 Save Time Enterprise Resource Planning Bookmarks Options Holidays Data Warehousing Writing Active Directory Automobile Computing Infrastructure Computer Care Identities Mail Merge Features Banking Shared resources Windows Server 2008 Gadget Technology Assurance Group ’s 18 Network Congestion Technology Laws Permission VoIP Sponsor Peripheral Voice over Internet Protocol Technology Tips Chatbots Computer Repair Touchscreen Geography Techology Authorization GDPR Outsourcing Modem Retail Cortana Google Wallet Fleet Tracking Procurement PowerPoint Value of Managed Services Multi-Factor Security Wearable Technology Physical Security Mobile Lenovo Favorites 5G IT Microsoft Excel GPS Windows Server Printer Alerts 3D Printing Hard Drives Google Docs Cache Address Distributed Denial of Service Annual Convention Statistics Test Video Conferencing Supercomputer Processors Digital Star Wars Obstacle PCI DSS Telephone Crowdsourcing Comparison Identity Humor High-Speed Internet Disaster Resistance Tracking Cookies Drones Asset Tracking Outsource IT Google Calendar G Suite History Office Tips Backups Superfish Conferencing Wireless Internet Business Telephone Security Cameras User Management Google Maps Unsupported Software Virus Cyberattacks Manufacturing Optimization Managed IT Service Taxes San Diego Update Deep Learning Bluetooth MSP Biometric IT Budget Spyware Course Transportation Mobile VoIP Specifications Development Proactive IT Zero-Day Threat Virtual Desktop Permissions Nanotechnology Social Engineering USB Alt Codes Shortcut OneNote Laptop Virtual Assistant Vendor Legislation IT Technicians Cabling Managing Stress Employer/Employee Relationships IT Assessment Tech Terms Batteries SharePoint Staff Mobile Data Cryptocurrency Firefox eWaste Read Only Hard Disk Drives Virtual Machines Break Fix Social Networking Projects Gamification Unified Threat Management Hotspot CRM Cyber security Black Friday Point of Sale Roanoke — Central Technology Solutions Heating/Cooling Cables IT Consulting Backup and Disaster Recovery Fraud Screen Reader Safety Typing WannaCry Remote Working Wasting Time Smart Devices Cybercrime Mirgation Dark Data Personal Information Hacks Enterprise Content Management Finance Proactive Maintenance Digitize Hacking Theft Marketing ROI Downloads Sync Solid State Drives Credit Cards Telephony Motherboard Best Practice Return on Investment User Error Public Cloud Language Notifications Cost Management E-Commerce Buisness Teamwork Law Enforcement Cyber Monday technology services provider Servers Wires Human Error Cameras Motion Sickness Administrator CCTV Regulation Relocation Webcam Hard Disk Drive IT Consultant Error Students Emergency Printers CrashOverride Web Server