crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to payypal.com and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

Integrated Business Technologies can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at (918) 770-8738 to learn more.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 23 July 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Privacy Managed Service Provider Business Management Tip of the Week Internet Microsoft Saving Money Cloud Business Computing Productivity Workplace Tips Backup IT Services Best Practices Hackers Hosted Solutions Network Mobile Devices Hardware IT Support Malware Email Business Software Small Business Smartphones Data Server Upgrade Communication Windows Mobile Device Management Microsoft Office VoIP Virtualization Disaster Recovery Business Continuity Google Miscellaneous Mobile Office Computer Efficiency Vendor Management Gadgets Quick Tips Innovation Social Media Mobile Computing Holiday WiFi Windows 10 Passwords BYOD Bring Your Own Device Best Practice User Tips Wireless Technology Operating System Apple Spam Smartphone Users Internet of Things The Internet of Things Remote Monitoring Trending Content Filtering Remote Computing Going Green History Alert Office IT Solutions Unified Threat Management Lithium-ion Battery Save Money IT Consultant Browser Android Information Technology Current Events Firewall Big Data Analytics Customer Relationship Management Facebook Windows 8 Managed IT services Printer Tech Support Humor Saving Time Gmail Avoiding Downtime Hard Drives App Phone System Outlook Health Data Management Collaboration Marketing Excel Office Tips Retail Phishing Ransomware Network Security IT service Business Growth Apps Application Virus Customer Service Computers Maintenance Fax Server Administration Presentation Outsourced IT Budget Automation Computer Repair Router Recovery Antivirus Inbound Marketing Running Cable Social Mobile Device Digital Payment Artificial Intelligence PowerPoint VPN Risk Management Training Employer-Employee Relationship Hacking iPhone Password Co-Managed IT Downtime Two-factor Authentication Augmented Reality Search Virtual Desktop USB Piracy Business Owner Sports Hacker Proactive IT Point of Sale Programming User Mouse Analyitcs Money Encryption Education Document Management Safety Net Neutrality Licensing IBM Settings Wireless Chrome Cybercrime File Sharing Save Time Social Networking Hosted Solution Hiring/Firing Display Data storage Tablet Managed IT Website Statistics Help Desk Robot User Error Printing Intranet Business Intelligence End of Support Competition LiFi Network Congestion Public Speaking Computing Windows 8.1 Update Recycling Cortana Monitors Best Available eWaste Files Deep Learning Google Wallet Adminstration Knowledge Writing Environment Private Cloud Bluetooth 3D Drones Online Currency Samsung Buisness Debate Experience Social Engineering Troubleshooting Public Cloud Heating/Cooling Identities Computer Accessories Backups Consumers Crowdfunding CIO Scam Sync Solid State Drive Scheduling IP Address Legal Company Culture Twitter Compliance Mobile Device Managment Refrigeration Alt Codes Disaster Touchscreen Specifications YouTube Regulations Cybersecurity Cost Management Typing Digital Signature Memory Google Drive Bandwidth Laptop How To Mobility Cryptocurrency Wearable Technology Conferencing Wi-Fi Google Docs Documents Entrepreneur Halloween Flexibility PC Care Software Tips Undo Bitcoin Alerts Macro Value People 5G PDF communications eBay Scary Stories Leadership Data Backup Hacks Remote Support Streaming Media New Additions Office 365 Skype SaaS Unified Communications Print Server Gaming Console Text Messaging Domains Work Station Congratulations Fun LinkedIn Telephony Word Law Firm IT Video Surveillance

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code