crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

Integrated Business Technologies can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at (918) 770-8738 to learn more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 20 July 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Cloud Internet Microsoft Business Computing Best Practices Saving Money Productivity Workplace Tips IT Services Hosted Solutions Backup Hackers Mobile Devices Malware Email Software IT Support Business Small Business Hardware Network Data Communication Server Smartphones Upgrade Business Continuity VoIP Google Computer Windows Mobile Device Management Disaster Recovery Virtualization Efficiency Microsoft Office Miscellaneous Innovation Mobile Office Vendor Management Holiday Gadgets Social Media BYOD Outsourced IT Mobile Computing Data Backup Android Smartphone User Tips Quick Tips Passwords Browser WiFi Bring Your Own Device Internet of Things Tech Term Windows 10 Managed IT services Network Security Remote Monitoring Spam Ransomware Best Practice The Internet of Things Data Management Trending Wireless Technology Operating System Apple Remote Computing Data Recovery Alert Users Content Filtering Going Green Artificial Intelligence History Gmail Firewall Save Money IT Consultant Printer Tech Support Managed IT Information Technology Current Events App Customer Relationship Management Analytics Encryption Unified Threat Management IT Solutions Big Data Lithium-ion Battery Office Facebook Windows 8 Two-factor Authentication Cloud Computing Router Antivirus Paperless Office Document Management Humor Saving Time Avoiding Downtime Maintenance Applications Employer-Employee Relationship Hard Drives Collaboration Bandwidth Marketing Excel Automation Office Tips Retail Mobile Device Phishing Digital Payment IT service VPN Productivity Apps Risk Management Application Chrome Business Growth Managed IT Services Virus Fax Server Customer Service Website Hacking Outlook Phone System Computers Health Compliance Cybersecurity Presentation Data Security Computer Repair Proactive IT Budget Inbound Marketing Mouse Social Recovery Net Neutrality Money Unified Communications Infrastructure File Sharing Running Cable PowerPoint Licensing Social Networking Training Tablet Wi-Fi Government User Error iPhone Office 365 Project Management Co-Managed IT Password Administration Augmented Reality Regulations Mobility Sports Search Virtual Desktop USB Business Owner Point of Sale Tip of the week Scam Flexibility Hosted Solution Twitter Data storage Company Culture Hacker Internet Exlporer User Programming Robot Smart Technology Analyitcs IBM Mobile Security Printing Education IoT End of Support Safety Specifications LiFi Computing Settings Wearable Technology IT Support Cost Management Wireless Vulnerability Cybercrime Display Save Time Alerts Hiring/Firing Data loss Help Desk Redundancy BDR Intranet Business Intelligence Statistics Recycling Competition Files Network Congestion Blockchain eWaste Downtime Piracy HIPAA Nanotechnology Google Drive Comparison Online Currency Windows 10 Enterprise Resource Planning How To Permissions Cryptocurrency Unified Threat Management Knowledge Environment Computer Accessories Private Cloud IT Technicians Screen Reader Google Docs Black Friday Samsung Mobile Fraud Bitcoin Access Control Experience Troubleshooting Techology Debate Public Cloud Mirgation Software Tips Smart Tech Cyber Monday Heating/Cooling Scheduling Consumers Server Management Crowdfunding Managing Stress communications Hacks SharePoint Touchscreen Sync Storage Connectivity IP Address Enterprise Content Management Migration Downloads Mobile Device Managment Disaster Distributed Denial of Service Refrigeration Patch Management Vulnerabilities Virtual Reality Hotspot Chatbots Multi-Factor Security Digital Signature Conferencing Star Wars Monitors Managed IT Service Memory Geography SaaS Language Deep Learning Identity PC Care Google Wallet Google Calendar Laptop Macro G Suite Value Utility Computing Writing Break Fix Documents Virtual Private Network High-Speed Internet eBay Chromebook Computing Infrastructure Leadership Drones Legislation Halloween Entrepreneur Remote Support Travel Streaming Media Healthcare New Additions Social Engineering Dark Web Buisness Undo Skype Disaster Resistance 5G Gaming Console PDF Print Server People Development Text Messaging Cooperation Identities Motherboard Backups Scary Stories Work Station Assessment Hard Drive Congratulations Data Warehousing CIO LinkedIn Solid State Drive IT Consulting Law Firm IT Cables Video Surveillance Telephony Staff Identity Theft Modem Legal Software as a Service Windows 8.1 Update IT Management Cache Microsoft Excel Domains Best Available Alt Codes Data Breach Fun Business Technology Wires Operations Cookies Technology Tips Word Adminstration Network Management Management YouTube Public Speaking Typing Technology Laws Cortana 3D Bluetooth Networking Machine Learning

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...