Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to payypal.com and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

Telesys Voice and Data can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at (800) 588-4430 to learn more.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Monday, 24 July 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Cloud Technology Hackers Best Practices Privacy Business Computing Business Productivity Malware Microsoft Email Windows 10 Internet Computer Backup Hosted Solutions Workplace Tips IT Services Managed Service Provider Smartphone Google Social Media Hardware Ransomware Communication IT Support Mobile Devices App Software Efficiency Network Security Disaster Recovery Business Continuity Android Office User Tips Miscellaneous Browser WiFi Data Innovation Facebook Upgrade Microsoft Office Windows Network Big Data Managed IT services Data Management Smartphones Spam Holiday Gmail Password Robot Apps Hosted Solution Server Office 365 Apple Avoiding Downtime Unified Threat Management Hacker Firewall Customer Service Mobile Device Management Internet of Things How To Content Filtering Save Money Remote Monitoring Phishing Recovery Work/Life Balance Office Tips Customer Relationship Management Telephone Systems Employer-Employee Relationship Settings Passwords Productivity Chrome Cloud Computing Risk Management Computers Artificial Intelligence Health Alert Data storage Hacking Education Cybercrime Operating System Small Business Business Management Money Saving Money Remote Computing Social Presentation Business Growth YouTube Collaboration Outlook Legal User File Sharing LiFi Twitter Politics Retail Monitors Analytics Vendor Management Best Practice Google Drive Lithium-ion battery Cybersecurity The Internet of Things Going Green IT Support Business Owner Physical Security Taxes IT Management Running Cable Botnet IBM Printing Word Managed IT Services Marketing Bandwidth Mobile Computing Computing Bring Your Own Device Competition Tech Support Sports IT service Cortana Outsourced IT Information Technology Virtualization Computer Care Administration Humor Virtual Reality Mobile Device Training IT solutions Safety Paperless Office Analyitcs SaaS VoIP Encryption Wireless Technology Automobile Upgrades Wireless Budget Downtime End of Support Website communications Wi-Fi Law Enforcement Google Maps Network Congestion Domains Entrepreneur Uninterrupted Power Supply Unified Communications Unsupported Software 5G Application CCTV Spyware Emoji Tracking Gadget Users Display Public Speaking Solid State Drive Mobile Data Two-factor Authentication Hacks How To Document Management iPhone Travel Hard Disk Drive Current Events Processors Identity Theft Laptop Hard Drives G Suite Firefox Websites Virtual Desktop Automation Augmented Reality Motion Sickness Supercomputer Halloween Google Docs Refrigeration Help Desk Writing Fun Deep Learning Personal Information Samsung IT Budget PowerPoint Scary Stories IT Consultant Quick Tips Machine Learning Licensing Social Engineering Search Meetings Maintenance Consumers Computer Repair Notifications Digital Payment Storage Undo Cleaning Time Management Relocation Software Tips IP Address Google Wallet Webcam Corporate Profile Alt Codes Electronic Medical Records eWaste Crowdsourcing Dark Data Network Management Private Cloud Data Backup IT Sevices Mobile Office Drones Point of Sale WannaCry Typing Environment Government Buisness Error Cabling Knowledge Data loss Cryptocurrency Troubleshooting BYOD Tablet Infrastructure Experience Web Server VoIP Bitcoin Update Staffing BDR Phone System Administrator Disaster 3D Printing Mouse Cameras Digital Specifications Windows 8 Chromebook GPS

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code