Pulse Technology Solutions Blog

View the blog entries posted by James Ritter. IT blogs covering cloud, security, best practices, how-tos, and more.

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to payypal.com and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

Pulse Technology Solutions can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at 239-362-9902 to learn more.

Solid Vendor Management Leads To Solid Successes
What's It Mean When Online Traffic is Concentrated...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Business Computing Best Practices Malware Privacy Network Security Hackers Productivity Backup IT Services Managed IT Services Software Microsoft Ransomware Outsourced IT Business User Tips Computer IT Support Internet Email Business Continuity Mobile Devices Windows 10 Managed IT Remote Monitoring Efficiency Google Android Smartphone Productivity Social Media Data Recovery Unified Threat Management Hosted Solutions Office 365 IT Support Hardware Data Backup Data Management Disaster Recovery Recovery Workplace Tips Work/Life Balance Managed Service Provider Cybersecurity Apps Innovation Cloud Computing Tip of the week Communication Managed IT Services App Data Training Save Money SaaS Big Data Phishing Firewall Word Password Windows Collaboration Telephone Systems Internet of Things Paperless Office IT Service Hosted Solution Robot Mobile Device Smartphones Small Business Browser Facebook Content Filtering File Sharing How To Risk Management Twitter Uninterrupted Power Supply Encryption Data Storage Vendor Management Physical Security Taxes Windows 10 VoIP Mobility Virtualization VoIP Websites Alert Artificial Intelligence Going Green BDR Botnet Samsung Education IT Management Health Politics Maintenance Computer Care Hacker Virtual Reality Antivirus BYOD Money Virtual Private Network Automobile Mobile Device Management Wireless Files Chrome Google Maps G Suite Address CCTV Legal Touchscreen Lenovo Unified Threat Management Update Personal Information Data loss Redundancy Law Enforcement Firefox Tech Support Remote Computing Superfish User Error Chromebook Administrator Search Gadget Customer Relationship Management Network IT Consultant Budget IT Solutions Processors Solid State Drive Scam YouTube Printer Supercomputer Business Management Wi-Fi Microsoft Office Assessment Business Growth Cybercrime Upgrades Heating/Cooling Hard Disk Drive Networking Settings Access Control IT Budget Computer Repair Outlook Holiday Office Consultation Licensing Travel Bandwidth Servers Data Security Digital SharePoint Digital Payment Downtime Upgrade Shortcut Virus Software Tips Motion Sickness WiFi Information Technology Help Desk Error Server Management Techology Spyware Emoji Sync Patch Management Quick Tips Computers Meetings GPS Cleaning Private Cloud Statistics Employer-Employee Relationship Server Computing Mobile Device Managment Electronic Medical Records Vulnerability Crowdsourcing Telephony Google Drive USB History Webcam Tracking Sports Public Cloud Social Bluetooth Unsupported Software IBM Tablet VPN Government Point of Sale Wireless Technology Avoiding Downtime Automation Cabling Project Management Document Management Staffing Communications Notifications Corporate Profile How To Apple Web Server Time Management Infrastructure Hacking WannaCry Analytics Customer Service Cortana Mail Merge Cameras Network Management Black Market Disaster Business Technology Identity Theft Office Tips Trending Mobile Data Monitors Cost Management Thank You Congratulations Downloads Disaster Resistance Two-factor Authentication Proactive IT CrashOverride Multi-Factor Security IT Consulting Emergency Data Breach Technology Laws Hacks

Newsletter Sign Up