Pulse Technology Solutions Blog

View the blog entries posted by James Ritter. IT blogs covering cloud, security, best practices, how-tos, and more.

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to payypal.com and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

Pulse Technology Solutions can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at 239-362-9902 to learn more.

Solid Vendor Management Leads To Solid Successes
What's It Mean When Online Traffic is Concentrated...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 24 September 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Business Computing Best Practices Malware Privacy Network Security Productivity Backup Hackers Software Managed IT Services IT Services Business Ransomware Microsoft Outsourced IT IT Support Email Internet Business Continuity Mobile Devices Windows 10 Computer Managed IT Efficiency Google Productivity User Tips Social Media Remote Monitoring Data Recovery Hosted Solutions Hardware Smartphone Disaster Recovery Data Backup Recovery Workplace Tips Unified Threat Management Cloud Computing Communication IT Support App Training Managed IT Services Data Android Save Money Work/Life Balance SaaS Managed Service Provider Data Management Apps Innovation Office 365 Collaboration Telephone Systems Cybersecurity Phishing Word IT Service Hosted Solution Smartphones Internet of Things Paperless Office Windows Robot Content Filtering Mobile Device File Sharing Facebook Risk Management How To Big Data Firewall Password Websites Alert Uninterrupted Power Supply Botnet Samsung BDR Windows 10 VoIP Mobility Going Green Tip of the week Education Politics Health Hacker Computer Care Small Business IT Management BYOD Automobile Browser Mobile Device Management Virtual Reality Money Files Twitter Encryption Data Storage Wireless Taxes Virtualization Vendor Management Physical Security VoIP Address Chrome Network Google Maps Touchscreen IT Solutions Data loss Wi-Fi Travel Holiday Redundancy Firefox Downtime Virus Upgrades Computer Repair Artificial Intelligence Motion Sickness Search Error Customer Relationship Management Office Information Technology Bandwidth Sync Solid State Drive Computers YouTube Upgrade Supercomputer Meetings Microsoft Office Private Cloud Assessment Cleaning Mobile Device Managment Crowdsourcing Heating/Cooling Help Desk Hard Disk Drive Emoji USB Settings IT Budget Webcam Telephony Outlook Public Cloud Project Management Consultation Licensing Government Servers Computing Automation Digital Electronic Medical Records Digital Payment Point of Sale Shortcut Communications Notifications Software Tips Staffing Social WiFi Unsupported Software Server Management Sports Spyware Web Server Patch Management Business Technology Quick Tips Wireless Technology GPS Statistics Maintenance Black Market Employer-Employee Relationship Server Cameras Vulnerability Office Tips Lenovo Google Drive History Tracking G Suite Bluetooth IBM VPN Cortana Tablet CCTV Superfish Avoiding Downtime Cabling Corporate Profile Document Management Mobile Data Law Enforcement Antivirus Tech Support Virtual Private Network Remote Computing How To Apple Administrator Time Management Legal Infrastructure WannaCry Personal Information Gadget Hacking Update Budget Mail Merge Processors Analytics Customer Service IT Consultant Business Management Network Management Disaster Business Growth Monitors Identity Theft Cybercrime Trending Chromebook Thank You Congratulations Emergency Hacks CrashOverride Scam Cost Management Networking

Newsletter Sign Up