Attend IT Limited Blog

Tip of the Week: 5 Ways to Easily Identify a Phishing Attack

Tip of the Week: 5 Ways to Easily Identify a Phishing Attack

If you’ve been reading this blog for any length of time, you’ve seen us reference a phishing attack. Whether you are being asked by some supposed Nigerian prince to fork over money or you are getting an email by what seems to be your bank that directs you to download an attachment, you are probably a potential victim of a phishing scam. The difference between being a potential victim and a victim is knowing how to identify it. Today, we’ll give you five ways to identify a phishing message so that you—or your company—won’t be scammed.

#1 - Urgency

When you get an email and the verbiage is such that it immediately makes you panic a little, you are probably dealing with a phishing attempt. Email is a really useful tool for businesses and individuals alike, but it typically isn’t the medium where someone is going to give you news that will make your anxiety spike. The message can come from many different directions, but if its tone is one where it makes you think you have to act immediately, you should calm down and verify the message with a call or text. 

#2 - Attachments

Again, email is useful for interpersonal communication, but unless you are expecting an email, or you know exactly who is sending you a message, you should never click on an attachment. This goes double if it is from a financial institution. No reputable bank is going to send you a downloadable attachment unless you are in direct communication with them. Even then, these organizations have secure apps for these types of transactions. Do yourself a favor and don’t download attachments from emails unless you know exactly what the attachment is.

#3 - Spelling and Grammar Errors

Let me ask you this: In the course of doing business, when corresponding with people outside your organization, do you send emails with gratuitous spelling and error problems? No? That’s because you don’t want the recipient to be put off by your handle of the language. Phishing emails tend to be written by people whose first language isn’t English and they tend to make terrible spelling and grammar mistakes. If you are getting an email from your bank, but the content of the message is riddled with typos, you are dealing with a phishing email.

#4 - Your Personal Information

Any email that is sent to you that asks for personal information should be met with caution. Even if it looks authentic, when the email directs you to provide information that you don’t feel comfortable giving out—like a credit card number or your social security number—you’re almost always dealing with a scammer. If an organization needs your personal information, it will create an interface that will allow you to securely provide that information. They can’t afford not to.

#5 - Addresses Aren’t Legitimate

Finally, one of the telltale signs that you are being phished is the legitimacy of the links and addresses in the message itself. Firstly, you should be suspect of links in unsolicited emails anyway, but to be sure, you can mouse-over any links. If you don’t immediately recognize the web address, don’t click on the link. As far as email addresses go, it can often be difficult to tell if an email address is legitimate or not. One rule of thumb, if there is more than one period in the address, don’t click on it. It may be legitimate, but investigating it takes seconds and can help you avoid a lot of headaches. 

Here’s a quick, short guide to help you and your staff:

  1. Everyone handles their domains a little differently, but use this as a general rule of thumb:
    • a. paypal.com - Safe
    • b. paypal.com/activatecard - Safe
    • c. business.paypal.com - Safe
    • d. business.paypal.com/retail - Safe
    • e. paypal.com.activatecard.net - Suspicious! (notice the dot immediately after Paypal’s domain name)
    • f. paypal.com.activatecard.net/secure - Suspicious!
  2. paypal.com/activatecard/tinyurl.com/retail - Suspicious! Don’t trust dots after the domain!
  3. Check the email in the header. An email from Amazon wouldn’t come in as noreply@amazn.com. Do a quick Google search for the email address to see if it is legitimate.
  4. Always be careful opening attachments. If there is an attachment or link on the email, be extra cautious.
  5. Be skeptical of password alerts. If the email mentions passwords, such as “your password has been stolen,” be suspicious. 

We hope that this short guide helps you avoid clicking on phishing attacks as they can have devastating and adverse effects on your computer, your network, and your business. For more great tips and tricks, return to our blog regularly. If you want to talk about how best to train your staff about phishing attacks, call us today at 020 8626 4485.

Where Mobility Gets Shaky
Businesses Need Data Backup to Manage Risk
 

By accepting you will be accessing a service provided by a third-party external to https://www.attendit.net/

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Network Security Business Computing Tip of the Week Best Practices Productivity Cloud Managed IT Services Privacy Disaster Recovery communications Hosted Solutions VoIP Data Recovery Data Backup Malware Hackers Backup Data Business Email Outsourced IT Innovation IT Services Business Continuity Small Business Cloud Computing Productivity Mobile Devices Software Efficiency Cybersecurity Computer Internet IT Support IT Support Phishing Internet of Things Automation Business Management Smartphone Saving Money Hardware Upgrade Information Technology Collaboration Mobile Device Management BDR Microsoft Managed IT services Server Managed IT BYOD Ransomware Mobility User Tips Covid-19 Risk Management Managed Service Provider Budget Communication Windows 7 Compliance Artificial Intelligence Avoiding Downtime Network Save Money History Gadgets Data Management Quick Tips Password Hosted Solution Spam Remote Computing Computers Firewall Wireless Passwords Smartphones Cost Management Meetings Virtual Private Network Wi-Fi Hard Drives Remote Work Value Audit Conferencing Business Technology Workplace Tips Remote Workers Employee-Employer Relationship Solid State Drive VPN MSP Saving Time Automobile Data Breach Microsoft Office Printing Data Security Google Instant Messaging Human Resources Windows 10 Redundancy Personal Information Tech Term Android Networking Employer-Employee Relationship Document Management Telephone Systems Router Paperless Office Manufacturing Content Filtering IT Service Managed Service Training Devices Recovery Marketing Hybrid Cloud SMB Active Directory Virtualization Smart Tech Vendor Windows Server 2008 Project Management Remote Working Students Utility Computing Windows 10 Cybercrime Company Culture Operating System Break/Fix Window 10 Software as a Service Spyware Commerce Facebook Development Downtime PCI DSS Financial Technology Upgrades IoT Telephony Windows Server Shadow IT Big Data Connectivity Business Intelligence Users Employees Office Unified Communications Advertising WPA3 Transportation Online Storage Apple Laptop Update Help Desk Wasting Money Dark Web E-Commerce Regulations Compliance Legal Antivirus Proactive IT Private Cloud Evernote Streaming Media App Social Media Copiers intranet Remote Monitoring Video Conferencing File Storage Going Green Customer Relationship Management User Error Cost Wireless Internet Administration Mobile Computing Applications Computing Amazon Payment Cards Word Education Cleaning Managed Services Wireless Technology Holiday AI Regulation Machine Learning Mobile Content Filter SaaS Managed IT Service Voiceover Internet Protocol Work/Life Balance Payroll Vulnerability Phone System Outsource IT Bandwidth Mobile Device OneNote Government Voice over Internet Protocol Data Loss Hacking Gamification Colocation Time Management Analysis Virtual Assistant Nanotechnology Application Telephone Data Protection Money Entertainment Samsung Black Market Professional Services Workers Disaster Monitoring Browser Business Telephone Office 365 Azure Chromebook e-waste Fiber Optics Save Time Smart Technology Hacker Workstations Alexa for Business Social Engineering Backup and Disaster Recovery Two-factor Authentication End of Support Flexibility Mobile Office Proactive HIPAA The Internet of Things Cybersecurty Travel Encryption Electronic Medical Records Printer Management Printers iPhone Computer Repair Lifestyle Adobe Wireless Charging Analytics Settings Reputation YouTube Microsoft Excel Windows 10s Outlook Mobile Security Information Augmented Reality Point of Sale Organization Gmail Wasting Time Scalability Miscellaneous CRM Websites Computer Fan Office Tips Myths Tablets Microsoft Word Safety Cast Health Server Maintenance Inventory Legislation WannaCry Workstation Business Strategy Holidays File Sharing Identity Theft Keyboard Shortcuts Hard Disk Drive Shortcut Data Theft Politics Charger Net Neutrality Identity HaaS 5G Tech Support PowerPoint Accessory Internet Exlporer Keyboard Gifts Threats NFL Maintenance Managing Stress Emergency Display Consultant Windows Investment Communitications Comparison Language Vendor Management Security Cameras Processor Licensing USB Books Telework Testing Social OneDrive Storage Worker Commute Scam Excel Experience Data Privacy Television CrashOverride Medical IT Fraud Peripheral Emails IT Solutions Humor Micrsosoft Computer Care Scams eWaste Google Assistant Co-Managed Services HBO Search Google Drive ROI Hosted Desktop Specifications PDF Best Practice Benchmarks Virtual Reality Audits Camera Chrome Sabotage Sports IT budget Financial Credit Cards Hard Drive eCommerce Edge Remote Access Control Webinar WIndows Server 2008 How To Alert Digital Signage Unsupported Software Employee Managed Services Provider Windows Ink Device Security Worker Policy Twitter Touchscreen Windows Server 2008 R2 Smart Devices Sales Virus iOS Sync Apps Solutions Projects WiFi Data Storage Relocation PC Cortana Blockchain Bring Your Own Device FAQ Music Internet Service Provider Law Enforcement Robot Google Docs Ciminal Innovations Memory Admin IT solutions Patch Management Current Events App store Root Cause Analysis Facebook Privacy Google Maps Battery Procedure Computer Forensics Hyperlink IT Management Troubleshooting Retail Text Messaging Updates Unified Threat Management Screen Mirroring Video Games Smartwatch Identities Computer Accessories