Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to payypal.com and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

Telesys Voice and Data can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at (800) 588-4430 to learn more.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Monday, 20 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Hackers Privacy Business Computing Productivity Malware Business Microsoft Email Windows 10 Internet Backup Hosted Solutions Computer IT Services Software User Tips Smartphone Ransomware Network Security Workplace Tips Google Managed Service Provider Android Hardware IT Support Mobile Devices Social Media Business Continuity Efficiency Browser Communication Disaster Recovery Managed IT services App Office Facebook Remote Monitoring Smartphones Upgrade Miscellaneous WiFi Data Innovation Microsoft Office Windows Data Management Office 365 Network Big Data Robot Apps Phishing Hosted Solution Recovery Spam Holiday Gmail Password Small Business Internet of Things Content Filtering Save Money Work/Life Balance Office Tips Tip of the week Employer-Employee Relationship Server Productivity Risk Management Cloud Computing Apple Artificial Intelligence Avoiding Downtime Unified Threat Management Word Hacker Mobile Device Management Customer Service Firewall Outsourced IT Data Backup How To Business Management Saving Money Remote Computing Business Growth SaaS Money Presentation Encryption Social Data Recovery Customer Relationship Management Outlook Chrome Passwords Telephone Systems Settings Health Cybersecurity IT Support Computers Alert Hacking Managed IT Services Data storage Computing Education Operating System Cybercrime Virtual Reality Analyitcs Training Government Mobile Device IT solutions Safety VoIP Paperless Office Data loss Wireless Technology BYOD Tablet Automobile Upgrades Wireless Budget Downtime End of Support Website communications Wi-Fi Mouse YouTube Windows 10 Collaboration User Legal File Sharing LiFi Two-factor Authentication Retail Twitter Monitors Best Practice Politics Analytics Vendor Management Lithium-ion battery Business Owner Google Drive The Internet of Things Websites Physical Security Going Green Virtual Private Network Marketing Taxes IBM Running Cable Botnet Mobile Computing Printing Samsung Bandwidth Competition Tech Support Maintenance Bring Your Own Device Search IT Management Sports Information Technology IT service Cortana Humor Virtualization Computer Care Administration Antivirus Business Technology Point of Sale WannaCry Typing Drones Buisness Technology Laws Time Management SharePoint Error Cabling Troubleshooting Managed IT Lenovo Cryptocurrency Knowledge Unified Threat Management Network Management Downloads Infrastructure Phone System Superfish Web Server VoIP Bitcoin Update Staffing Experience Specifications business communications systems Touchscreen Multi-Factor Security BDR Administrator Disaster 3D Printing Shortcut Scam Cameras Digital Windows 8 Chromebook GPS Network Congestion Domains Internet Protocol Google Calendar Law Enforcement Google Maps Uninterrupted Power Supply Unified Communications Unsupported Software 5G Entrepreneur Patch Management Application Networking CCTV Spyware Emoji Tracking Users Display Public Speaking VoIP streamlines Legislation Gadget Solid State Drive Mobile Data iPhone Hacks Vulnerability Data Security How To Document Management business network infrastructure Heating/Cooling Travel Hard Disk Drive Current Events VPN Hard Drives Techology G Suite Firefox Processors Identity Theft Laptop Virtual Desktop Automation data services Servers Motion Sickness Augmented Reality Refrigeration Disaster Resistance Assessment Supercomputer Halloween Google Docs Writing User Error PowerPoint Server Management Help Desk Deep Learning Personal Information Fun Mail Merge Consumers Proactive IT IT Consultant Consultation IT Budget Scary Stories Social Engineering Printer Statistics Machine Learning Licensing Address Meetings Computer Repair Undo IT Consulting Cleaning Notifications Digital Payment Storage Software Tips eWaste IP Address Bluetooth Relocation Project Management IT Sevices Webcam Corporate Profile Alt Codes Electronic Medical Records Google Wallet Data Breach Quick Tips Access Control Crowdsourcing Dark Data Private Cloud Environment Mobile Office

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code