crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to payypal.com and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

Integrated Business Technologies can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at (918) 770-8738 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 24 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Business Management Privacy Managed Service Provider Internet Microsoft Cloud Saving Money Productivity Business Computing Workplace Tips IT Services Best Practices Backup Hackers Hosted Solutions Mobile Devices Email Small Business Malware Business IT Support Software Hardware Network Data Smartphones Communication Server Upgrade Windows Business Continuity Mobile Device Management VoIP Google Virtualization Efficiency Microsoft Office Disaster Recovery Computer Miscellaneous Mobile Office Vendor Management Holiday Gadgets Innovation Social Media Android Quick Tips BYOD User Tips Mobile Computing Smartphone WiFi Windows 10 Outsourced IT Remote Monitoring Browser Best Practice Bring Your Own Device Passwords Wireless Technology Network Security The Internet of Things Trending Operating System Apple Users Spam Internet of Things Managed IT services Alert Going Green Firewall Content Filtering Remote Computing History Data Management Data Backup Printer Tech Support Analytics IT Solutions Lithium-ion Battery Ransomware Save Money Information Technology Current Events IT Consultant Gmail Managed IT Unified Threat Management Big Data Office Windows 8 Encryption Humor Facebook Saving Time Avoiding Downtime Antivirus Maintenance Hard Drives App Artificial Intelligence Customer Relationship Management Collaboration Two-factor Authentication Marketing Excel Automation Phone System Office Tips Retail Phishing IT service Apps Application Business Growth Virus Document Management Fax Server Employer-Employee Relationship Customer Service Hacking Digital Payment Outlook Computers Health Risk Management Data Recovery Tablet Presentation Budget Router Inbound Marketing iPhone Recovery Administration Money Augmented Reality Project Management Running Cable Licensing Chrome Training Computer Repair Proactive IT Mouse Data Security Social User Error Net Neutrality Cybersecurity Co-Managed IT Mobile Device Office 365 Password PowerPoint VPN Applications Search Virtual Desktop USB Files Scam Business Owner HIPAA Intranet Business Intelligence Hacker Programming Redundancy User Analyitcs Education Bandwidth Managed IT Services Safety Specifications Piracy Settings Flexibility Hosted Solution Mobile Security Wireless Data storage Sports Save Time Paperless Office Cybercrime Point of Sale Wi-Fi Robot Hiring/Firing Unified Communications Printing Help Desk End of Support LiFi Website Computing IBM Tip of the week Statistics Mobility File Sharing Wearable Technology Competition Network Congestion Social Networking Government Alerts Downtime Display Identities Value Data Breach Telephony Software as a Service Software Tips Microsoft Excel Backups eBay Remote Support Leadership Vulnerability Operations Knowledge Environment CIO Skype Solid State Drive Streaming Media New Additions Technology Laws Technology Tips Blockchain Legal Print Server Text Messaging Samsung Work Station Debate Virtual Private Network Experience Compliance Troubleshooting LinkedIn Heating/Cooling Alt Codes Scheduling Congratulations Unified Threat Management Private Cloud Comparison Infrastructure Permissions Law Firm IT Consumers Video Surveillance Crowdfunding Recycling IT Technicians Regulations Windows 8.1 Update YouTube Best Available Typing Access Control Public Cloud Black Friday IT Support Fraud IP Address Google Drive Mirgation How To Refrigeration Cryptocurrency Disaster SharePoint Sync Cyber Monday Internet Exlporer Google Docs Bluetooth Business Technology Online Currency Cost Management Bitcoin Digital Signature Downloads Mobile Device Managment Smart Technology Data loss Computer Accessories Memory Macro Networking Laptop communications Hacks Productivity Distributed Denial of Service IT Management Hotspot Documents Twitter Halloween Multi-Factor Security Company Culture Entrepreneur Managed IT Service Undo Travel Windows 10 Language 5G PDF Gaming Console Touchscreen People Techology Scary Stories Virtual Reality Google Calendar Break Fix Computing Infrastructure Monitors Deep Learning Disaster Resistance SaaS Legislation Dark Web Domains Google Wallet Server Management Cooperation Fun Writing Word Conferencing IT Consulting Cloud Computing Data Warehousing Public Speaking Drones Adminstration PC Care Staff Cortana Social Engineering eWaste Buisness 3D

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code