crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

Integrated Business Technologies can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at (918) 770-8738 to learn more.


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 24 September 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Privacy Business Management Managed Service Provider Tip of the Week Internet Microsoft Saving Money Cloud Productivity Business Computing Workplace Tips Backup IT Services Best Practices Hackers Hosted Solutions IT Support Mobile Devices Hardware Business Network Email Malware Software Small Business Data Communication Smartphones Windows Server Upgrade Mobile Device Management VoIP Virtualization Microsoft Office Business Continuity Google Efficiency Disaster Recovery Miscellaneous Mobile Office Computer Vendor Management Gadgets Innovation Social Media Quick Tips Windows 10 Mobile Computing Holiday WiFi Bring Your Own Device Best Practice Passwords BYOD Trending Operating System Apple Spam Users Wireless Technology Smartphone User Tips The Internet of Things Going Green Content Filtering Remote Computing History Remote Monitoring Alert Internet of Things Managed IT services IT Solutions Save Money Lithium-ion Battery IT Consultant Information Technology Current Events Big Data Office Firewall Android Unified Threat Management Browser Tech Support Humor Facebook Saving Time Avoiding Downtime Data Management App Hard Drives Customer Relationship Management Windows 8 Gmail Printer Analytics Customer Service Network Security Hacking Computers Apps Application Virus Collaboration Maintenance Fax Server Managed IT Outlook Health Office Tips Retail Ransomware Phishing IT service Marketing Excel Outsourced IT Business Growth Phone System Administration Employer-Employee Relationship Password Computer Repair Training Antivirus Presentation Social Digital Payment Mobile Device Artificial Intelligence Data Backup Budget Co-Managed IT VPN PowerPoint Automation Risk Management Recovery Running Cable iPhone Router Inbound Marketing Hiring/Firing Augmented Reality Piracy Encryption Website Statistics Sports Proactive IT Competition Point of Sale Mouse Network Congestion Mobility Downtime Hosted Solution Document Management Net Neutrality Two-factor Authentication Help Desk Data storage Search IBM Virtual Desktop User Error USB Business Owner Robot File Sharing Printing Social Networking Data Recovery Hacker End of Support User Programming LiFi Display Tablet Analyitcs Money Education Files Safety Settings Licensing Intranet Wireless Chrome Business Intelligence Cybercrime Save Time Halloween Entrepreneur CIO Sync Undo Solid State Drive 5G Legal PDF People Scary Stories Compliance Bluetooth Online Currency Mobile Device Managment Alt Codes Office 365 Computer Accessories Regulations YouTube Typing Cybersecurity Domains Fun Google Drive Macro How To Word Bandwidth Cryptocurrency Company Culture Twitter Public Speaking Cortana Google Docs eWaste Touchscreen Flexibility Bitcoin Software Tips Gaming Console Knowledge Environment communications Hacks Samsung Experience Troubleshooting Debate SaaS Heating/Cooling Unified Communications Wearable Technology Consumers Conferencing Crowdfunding Alerts PC Care Telephony IP Address Computing Value Adminstration Redundancy 3D Monitors eBay Disaster Remote Support Leadership Refrigeration Deep Learning Google Wallet Skype Specifications Streaming Media New Additions Project Management Writing Print Server Text Messaging Digital Signature Work Station Private Cloud Cost Management Scam Drones LinkedIn Memory Congratulations Laptop Social Engineering Buisness Law Firm IT Video Surveillance Windows 8.1 Update Recycling Scheduling Public Cloud Identities Wi-Fi Backups Best Available Documents

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...