Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

How to Avoid the Influence of a Phishing Scam

How to Avoid the Influence of a Phishing Scam

Phishing emails are a real problem for today’s businesses, which makes it critically important that you and your team can identify them as they come in. Let’s touch on a few reliable indicators that a message isn’t a legitimate one.

What Makes Phishing Attacks So Bad?

One of the largest threats inherent in a phishing scam is that there is a relatively low barrier for entry. There’s a tendency to romanticize hackers somewhat, picturing them in dark rooms lit only by an array of computer monitors as their fingers dance across their keyboard. While cinematic, this imagery is grossly inaccurate. In truth, hacking has trended more towards the psychological, focusing on user manipulation over fancy programming skills.

Which sounds easier to you, learning how to pick a lock, or asking someone for their keys?

Phishing attacks are not only easier on the cybercriminal, they’re also effective. It’s easy to be fooled by a legitimate-looking email or website, especially when you aren’t anticipating being scammed.

Let’s say someone poses as your bank. At first glance, there may be every indication that the email they send is legitimate. A quick look at the sender’s address may pass muster, the bank’s logo and contact information may be present, even any filters you have set up to organize your emails may work.

At a glance, all may be in order… which is exactly how many phishing emails will get you.

While phishing emails themselves aren’t usually dangerous, they contain links to risky and insecure websites or have nefarious files attached to them. Generally, these elements are where the danger lies.

Spotting a Phishing Attack

Let’s go through a step-by-step process to check any email that you may receive. The first sign of phishing can be found in its tone: if it has a too-good-to-be-true offer, is overly urgent, or is requesting information about one of your accounts unprompted, you’re right to be suspicious.

Check all links to confirm they direct to a legitimate URL. DON’T CLICK THEM. For example, if the email were from Amazon, links would most likely lead back to amazon-dot-com. However, anything added between “amazon” and “dot-com” is a sign of trouble. Furthermore, the dot-com should be immediately followed by a forward slash (/).

Let’s go through a few examples to demonstrate how important the little details of a URL can be, using PayPal as our subject.

  • paypal.com - Safe
  • paypal.com/activatecard - Safe
  • business.paypal.com - Safe
  • business.paypal.com/retail - Safe
  • paypal.com.activatecard.net - Suspicious! (notice the dot immediately after PayPal’s domain name)
  • paypal.com.activatecard.net/secure - Suspicious!
  • paypal.com/activatecard/tinyurl.com/retail - Suspicious! Don’t trust dots after the domain!

Check how the email address appears in the header. If you ever receive an email from Google, the address isn’t going to be “gooogle@gmail-dot-com”. If you’re unsure, throw any email addresses into a quick search for legitimacy.

Be wary of any attachments. As we mentioned above, most email-borne threats are going to be transmitted as an infected attachment, or as a link to a malicious website. If an incoming email has either a link or an attachment, exercise caution.

Don’t take password alerts at face value. Some scammers will use phishing emails to steal your credentials. Stating that your password has been stolen or some similar breach has occurred, the email will prompt you to supply your password—springing the trap.

If all this sounds like we’re telling you to wonder if any of your emails are legitimate, it’s because we are, in a way. With a healthy sense of skepticism, email and email correspondence can be very useful business tools. Many phishing attempts can also be weeded through with a reliable spam-blocker as well.

Want us to assist you with your email security? Call up our team of professionals by dialing 1-844-237-4300.

Google and Apple Pushed a COVID-19 Exposure Notifi...
A Brief Guide to Leading a Company During COVID-19
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, August 05 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.centraltechnologysolutions.com/

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Hosted Solutions Network Security Privacy IT Services Email Data Backup Internet Malware Hackers Software IT Support Business Efficiency Outsourced IT Microsoft Innovation Mobile Devices Productivity Data Recovery Computer Hardware Managed IT Services Small Business Google Upgrade Business Continuity IT Support Cloud Computing Cybersecurity Backup Collaboration Ransomware Phishing Smartphone User Tips Communication Tech Term Managed IT Services Managed Service Provider Workplace Tips Disaster Recovery Business Management VoIP Windows 10 Managed Service Mobile Device Smartphones Internet of Things Android Data Management Quick Tips Remote Monitoring Social Media Paperless Office Managed IT communications Network Facebook Browser Encryption Saving Money Windows 10 Save Money Windows Server Office 365 Artificial Intelligence Virtualization BDR Miscellaneous Business Technology BYOD Covid-19 Passwords Help Desk Wi-Fi Compliance Risk Management Holiday Government Document Management Apps Remote Work Vendor Management App Training Password Users Windows 7 Health Office Healthcare Mobile Device Management Microsoft Office Automation Unified Threat Management Gmail Content Filtering Bring Your Own Device Avoiding Downtime Going Green Employer-Employee Relationship Robot Big Data Data Security Applications Chrome Analytics Bandwidth Laptops Firewall Recovery IT Management Redundancy Money Tip of the week Information Scam Blockchain Data storage Computing Antivirus Project Management Information Technology Wireless Infrastructure SaaS Telephone Systems Data loss Vulnerability Processor Mobility Regulations File Sharing Two-factor Authentication Computers Apple Hosted Solution Storage Website Hard Drive IoT Flexibility Politics Work/Life Balance Access Control Customer Service Budget VPN Company Culture Virtual Reality RMM Gadgets Operating System Printing Customer Relationship Management Virtual Private Network OneDrive Proactive Machine Learning Unified Communications Remote Computing Settings IT Service Employee-Employer Relationship Tablet Software as a Service Router Downtime Meetings Files Maintenance Social Education Private Cloud Solid State Drive How To Samsung Word Search LiFi Tech Support Wireless Technology Legal Current Events Chromebook IT solutions Internet Exlporer Digital Payment HIPAA Social Network Websites Identity Theft Electronic Health Records Cooperation Monitoring Sports Mobile Security File Management Licensing Mobile Office Employees Time Management Networking Bitcoin Upgrades Patch Management Twitter Recycling Payment Cards Mouse Data Breach Utility Computing Consulting Outlook Network Management Co-Managed IT Display Dark Web Google Drive Augmented Reality End of Support Data Storage Assessment Server Management Managed Services Provider Spam Professional Services Managed Services How To Monitors WiFi The Internet of Things YouTube Business Growth Remote Monitoring and Management Alert Uninterrupted Power Supply Management Electronic Medical Records Consultation Mobile Computing Smart Technology Remote Workers Administration Net Neutrality Remote Worker Hacker Superfish WPA3 Financial Microsoft Excel Modem Projects Gamification IT Budget Enterprise Resource Planning Bookmarks Multi-Factor Security Wearable Technology Cyber security Deep Learning Virtual Desktop Distributed Denial of Service Annual Convention Proactive Maintenance Digitize Safety Bluetooth Features Printer Alerts Wasting Time Smart Devices Cabling Dark Data Personal Information Permission Alt Codes Proactive IT ROI Spyware Course Geography Authorization Comparison Identity Solid State Drives Credit Cards Fleet Tracking Procurement Cookies Return on Investment Cryptocurrency Notifications Shortcut Mobile Favorites Google Calendar Teamwork Point of Sale Managed IT Service San Diego Database Management Shadow IT Black Market Cache Database Sensors Cybercrime Peripheral Firefox Test Telephony Holidays Typing Writing Emoji Heating/Cooling IT Consulting Star Wars Notes Sync Hacks High-Speed Internet Specifications Options Asset Tracking Marketing Permissions Nanotechnology Active Directory Public Cloud WannaCry Conferencing Legislation IT Technicians Shared resources Law Enforcement Windows Server 2008 Best Practice Network Congestion MSP Break Fix Social Networking GDPR Botnet Outsourcing Hacking Cyberattacks Buisness SharePoint Staff Voice over Internet Protocol Travel PCI DSS Computer Repair 5G IT Retail Cortana Servers Unified Threat Management Hotspot PowerPoint Value of Managed Services Mobile Device Managment Software Tips Outsource IT Physical Security Development Zero-Day Threat Black Friday Roanoke — Central Technology Solutions OneNote Fraud Screen Reader Windows Server Automobile Computer Care Windows 8 Save Time 3D Printing Managing Stress Instant Messaging Mirgation Gadget Tech Terms Motherboard Video Conferencing Identities Processors Disaster Trending eWaste Read Only Downloads Telephone Wireless Internet Business Telephone GPS Technology Laws User Error Language Office Tips Laptop Mail Merge Cables Backup and Disaster Recovery Cyber Monday technology services provider Update Touchscreen Techology Smart Tech Security Cameras User Management Unsupported Software Virus VoIP Sponsor Enterprise Content Management Finance Migration Manufacturing Optimization Google Wallet Lenovo Theft Data Warehousing Biometric Supercomputer Hard Drives Google Docs Operations Transportation Crowdsourcing Mobile VoIP CRM Technology Assurance Group ’s 18 Employer/Employee Relationships IT Assessment Tracking Social Engineering USB Statistics Cost Management E-Commerce Computing Infrastructure Virtual Assistant Vendor G Suite History Humor Remote Working Address Wires Human Error Drones Disaster Resistance Connectivity Batteries Google Maps Backups Mobile Data Digital Obstacle Vulnerabilities Authentication Technology Tips Chatbots Hard Disk Drives Virtual Machines Taxes Students Webcam IT Consultant Error Hard Disk Drive Regulation Web Server Emergency CrashOverride Cameras Motion Sickness Administrator CCTV Relocation Printers