Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

Telesys Voice and Data can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at (800) 588-4430 to learn more.


No comments yet
Already Registered? Login Here
Sunday, 22 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Privacy Malware Business Computing Productivity Business Email Microsoft Windows 10 Internet Hosted Solutions Backup Software Computer Ransomware IT Services Network Security Managed Service Provider Mobile Devices Android Smartphone User Tips IT Support Workplace Tips Managed IT services Google Communication Social Media Hardware Browser Disaster Recovery Outsourced IT Business Continuity Efficiency Innovation Data Management App Smartphones Holiday Data Small Business Office Business Management Upgrade Cloud Computing Server Office 365 Microsoft Office Windows Data Backup Facebook Remote Monitoring Miscellaneous WiFi Artificial Intelligence Network Gmail Big Data Internet of Things Encryption Spam Firewall Password Robot Apps Data Recovery Phishing Hosted Solution Recovery Employer-Employee Relationship Productivity Cybersecurity Risk Management Apple Avoiding Downtime Word Unified Threat Management Hacker Customer Service Mobile Device Management How To Content Filtering Saving Money Government Infrastructure Remote Computing Save Money Money Paperless Office Work/Life Balance Office Tips Tip of the week Passwords Chrome Data Security Two-factor Authentication Settings Applications IT Support Analytics Vendor Management Health Managed IT Services The Internet of Things Computers Alert Hacking IT Management Mobile Computing Data storage Tech Support Bandwidth Computing Antivirus Education Mobile Device Managed IT Operating System Cybercrime Data loss Virtual Reality VoIP Presentation Business Growth SaaS BYOD Tech Term Social Windows 10 Website Customer Relationship Management Wi-Fi Outlook Telephone Systems Document Management Retail File Sharing Identity Theft LiFi Twitter Politics Monitors Virtual Private Network Best Practice Travel Lithium-ion battery Google Drive HIPAA Business Owner Server Management Websites Automation Augmented Reality Going Green Mobile Security Physical Security Marketing Taxes Licensing Running Cable Maintenance Botnet IBM Printing Digital Payment Samsung Competition Search Bring Your Own Device Sports Storage Information Technology IT service Project Management Cortana Humor Virtualization Computer Care Administration Business Technology Tablet Analyitcs Training IT solutions Safety Wireless Technology Automobile Upgrades Wireless Budget Downtime End of Support Specifications Scam communications Mouse YouTube Vulnerability Collaboration Unified Communications User Legal VPN Net Neutrality Firefox Mobile Data iPhone Hacks business network infrastructure Wearable Technology Servers Motherboard Smart Technology Techology Internet Exlporer Assessment Supercomputer Current Events Processors Laptop data services Hard Drives Software as a Service G Suite Help Desk Virtual Desktop Router Mail Merge Distributed Denial of Service Disaster Resistance Consultation Motion Sickness IT Budget Halloween Google Docs User Error IT Technicians Refrigeration Statistics Technology Tips PowerPoint Writing Modem Address Managed IT Service Fun Proactive IT Hotspot Deep Learning Personal Information Scary Stories Mirgation Consumers Bluetooth Comparison IT Consultant Software Tips Corporate Profile Machine Learning Social Engineering Cookies Redundancy Break Fix IT Consulting Language Quick Tips Printer Meetings Computer Repair Notifications Migration Undo Black Friday Cleaning WannaCry Relocation Nanotechnology eWaste IP Address Dark Web Google Wallet Data Breach Computing Infrastructure Time Management Access Control IT Sevices Webcam Alt Codes Electronic Medical Records Crowdsourcing Dark Data Chatbots Cyber Monday Cabling Private Cloud Environment Mobile Office Data Warehousing Drones Technology Laws Alerts Network Management SharePoint Point of Sale Typing Buisness Identity flu season VoIP Error Staffing Troubleshooting Lenovo Microsoft Excel Knowledge Unified Threat Management Cooperation Touchscreen Downloads BDR Cryptocurrency Shortcut Fort Worth Disaster Blockchain Phone System Digital GPS Superfish Experience business communications systems Staff Multi-Factor Security Web Server Google Maps Bitcoin Update Compliance Patch Management flu shot Uninterrupted Power Supply Permissions Spyware Administrator Tracking 3D Printing Internet Protocol Flexibility Google Calendar Cameras Windows 8 Chromebook Solid State Drive Law Enforcement Network Congestion Regulations Domains Fort Worth IT Networking Fraud Entrepreneur How To Unsupported Software 5G VoIP streamlines Operations Application Heating/Cooling Legislation CCTV Emoji Hard Disk Drive Gadget Users Display Social Networking Public Speaking DFW IT Service

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...