Pulse Technology Solutions Blog

View the blog entries posted by James Ritter. IT blogs covering cloud, security, best practices, how-tos, and more.

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to payypal.com and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

Pulse Technology Solutions can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at 239-362-9902 to learn more.

Solid Vendor Management Leads To Solid Successes
What's It Mean When Online Traffic is Concentrated...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 25 July 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Business Computing Best Practices Malware Hackers Productivity Managed IT Services Privacy Network Security IT Services Business Backup Computer IT Support Outsourced IT Internet Software Microsoft Windows 10 Ransomware Social Media Email Mobile Devices Efficiency Unified Threat Management Hardware Google Business Continuity Recovery Productivity Workplace Tips Managed Service Provider User Tips Disaster Recovery Save Money Apps Innovation Work/Life Balance Hosted Solutions Communication Remote Monitoring App Smartphone Training Content Filtering File Sharing Password Data Management Managed IT Big Data Firewall Cybersecurity Internet of Things Paperless Office Office 365 Cloud Computing Telephone Systems Robot Collaboration IT Service Hosted Solution Data IT Support Android Facebook Managed IT Services Mobile Device How To Risk Management SaaS BYOD Vendor Management Automobile Mobile Device Management Physical Security Twitter Data Storage Taxes Uninterrupted Power Supply Going Green Virtualization Phishing VoIP Education VoIP Alert Health BDR Small Business Botnet Windows Smartphones Politics Browser Virtual Reality IT Management Money Computer Care Data Backup Hacker Wireless IBM Tracking Web Server Legal Tablet Update Avoiding Downtime Personal Information Cabling Corporate Profile Document Management Cameras How To Files Apple Black Market Chromebook Time Management Office Tips Infrastructure G Suite Network WannaCry CCTV Analytics IT Solutions Customer Service Disaster Network Management Encryption Wi-Fi Monitors Law Enforcement Identity Theft Chrome Tech Support Upgrades Google Maps Remote Computing Artificial Intelligence Administrator Computer Repair Data loss Gadget Office IT Consultant Firefox Budget Bandwidth Processors Word Business Management Upgrade Cybercrime Mobility Business Growth Help Desk Customer Relationship Management Websites Solid State Drive Emoji Travel YouTube Holiday Supercomputer Assessment Samsung Hard Disk Drive Virus Computing Downtime Electronic Medical Records Motion Sickness Settings IT Budget Information Technology Sports Consultation Error Social Licensing Unsupported Software Sync Meetings Wireless Technology Digital Digital Payment Computers Cleaning Private Cloud Software Tips Crowdsourcing WiFi Mobile Device Managment Webcam Spyware Telephony USB Quick Tips Public Cloud Maintenance Government GPS Cortana Point of Sale Employer-Employee Relationship Server Automation Mobile Data Staffing Google Drive Communications History Notifications CrashOverride Cost Management Hacks Thank You Touchscreen Congratulations Windows 10 Tip of the week

Newsletter Sign Up