Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to payypal.com and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

Telesys Voice and Data can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at (800) 588-4430 to learn more.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Saturday, 23 September 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Privacy Business Computing Malware Productivity Business Microsoft Email Windows 10 Internet Backup Computer Hosted Solutions Software IT Services Workplace Tips Managed Service Provider Ransomware Smartphone Google Social Media Network Security Hardware User Tips IT Support Mobile Devices Business Continuity Android App Efficiency Communication Disaster Recovery Office Managed IT services Smartphones Upgrade Data Innovation Windows Miscellaneous Facebook Browser WiFi Microsoft Office Network Big Data Data Management Office 365 Password Remote Monitoring Gmail Internet of Things Spam Apps Phishing Holiday Hosted Solution Recovery Robot Avoiding Downtime Save Money Office Tips Work/Life Balance Customer Service Mobile Device Management Cloud Computing Server Word Hacker Firewall Unified Threat Management Content Filtering How To Apple Money SaaS Hacking Telephone Systems Employer-Employee Relationship Settings Risk Management Small Business Operating System Artificial Intelligence Computers Business Management Saving Money Productivity Remote Computing Presentation Business Growth Alert Customer Relationship Management Outsourced IT Education Data Backup Outlook Data storage Cybercrime Passwords Chrome Data Recovery Encryption Social Health communications Wi-Fi Windows 10 Marketing Paperless Office YouTube Automobile Mobile Computing Upgrades Tip of the week Budget Tech Support End of Support Competition LiFi Information Technology Cybersecurity Analytics Collaboration Legal IT Support Humor The Internet of Things File Sharing Twitter Managed IT Services Analyitcs IBM VoIP Politics Running Cable Monitors Vendor Management Google Drive Websites IT Management Bandwidth Going Green Bring Your Own Device Search Physical Security Sports Taxes Botnet IT service Printing Cortana Samsung Virtualization User Mobile Device Administration Computing IT solutions Safety Retail Wireless Technology Best Practice Computer Care Lithium-ion battery Wireless Business Owner Virtual Reality Website Downtime Training Error Google Maps Uninterrupted Power Supply Windows 8 Patch Management Domains PowerPoint BYOD Spyware Tracking Unified Communications 5G Entrepreneur Solid State Drive Consumers Web Server Application Update Vulnerability Public Speaking How To Document Management Users Two-factor Authentication Administrator 3D Printing Heating/Cooling VPN Mouse Hard Disk Drive Cameras Chromebook Law Enforcement Network Congestion Firefox Identity Theft eWaste IT Sevices Unsupported Software Servers Emoji Virtual Private Network Laptop CCTV Hard Drives Gadget Display Assessment Supercomputer Virtual Desktop Environment Hacks Help Desk Augmented Reality Mobile Data Server Management Mail Merge Halloween Refrigeration Consultation IT Budget Troubleshooting Current Events Licensing Deep Learning Fun Travel Statistics Processors Address Maintenance Scary Stories G Suite Phone System Automation Digital Payment Software Tips Motion Sickness Bluetooth Business Technology Google Docs Corporate Profile Specifications Undo IP Address Writing Quick Tips Alt Codes Personal Information Antivirus Lenovo WannaCry IT Consultant Mobile Office Machine Learning Social Engineering Time Management Cabling Typing Meetings Computer Repair Managed IT Notifications Superfish Storage Data loss Buisness Cleaning iPhone Relocation Network Management Tablet Google Wallet Infrastructure Cryptocurrency Knowledge Webcam Electronic Medical Records Crowdsourcing Dark Data VoIP Staffing Private Cloud Touchscreen BDR Drones Disaster Bitcoin Experience Point of Sale Shortcut Government Digital GPS

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code