crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to payypal.com and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

Integrated Business Technologies can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at (918) 770-8738 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 23 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Privacy Tip of the Week Managed Service Provider Business Management Microsoft Internet Saving Money Cloud Productivity Business Computing Workplace Tips IT Services Backup Best Practices Hackers Hosted Solutions Business IT Support Network Mobile Devices Hardware Email Small Business Malware Software Smartphones Data Communication Server Upgrade Windows Business Continuity Mobile Device Management Microsoft Office VoIP Virtualization Disaster Recovery Google Efficiency Computer Miscellaneous Mobile Office Vendor Management Gadgets Quick Tips Holiday Innovation Social Media User Tips BYOD Mobile Computing Windows 10 WiFi Passwords Remote Monitoring Smartphone Bring Your Own Device Best Practice Wireless Technology Browser Trending Operating System Apple Spam Android Users Internet of Things Alert Managed IT services The Internet of Things Going Green Content Filtering Remote Computing History Outsourced IT Unified Threat Management IT Solutions Network Security Save Money Lithium-ion Battery Printer IT Consultant Information Technology Current Events Big Data Firewall Office Data Management Customer Relationship Management Windows 8 Ransomware Analytics Facebook Tech Support Humor Gmail Saving Time Managed IT Avoiding Downtime Maintenance App Hard Drives Outlook Health Office Tips Retail Phone System Marketing Phishing Excel IT service Business Growth Antivirus Employer-Employee Relationship Apps Customer Service Application Hacking Virus Computers Digital Payment Artificial Intelligence Risk Management Fax Server Collaboration Data Backup Tablet Budget Automation iPhone Recovery Router Administration Inbound Marketing Running Cable Proactive IT Computer Repair Mouse Training Social Password Mobile Device VPN PowerPoint User Error Presentation Co-Managed IT Two-factor Authentication Search Files Virtual Desktop USB Business Owner Applications Intranet Hacker User Business Intelligence Programming Analyitcs Money Encryption Education Specifications Augmented Reality Tip of the week Safety Settings Licensing Piracy Chrome Data Recovery Wireless Cybercrime Save Time Sports Hosted Solution Point of Sale Hiring/Firing Data storage Cybersecurity Website Document Management Office 365 Robot Net Neutrality Statistics Project Management IBM Mobility Printing End of Support Competition Help Desk LiFi File Sharing Network Congestion Computing Downtime Social Networking Display Knowledge Writing Environment Value Techology eBay Legislation Remote Support Samsung Leadership IT Support Drones Experience Social Engineering Skype Troubleshooting Buisness Streaming Media Debate New Additions Disaster Resistance Text Messaging Private Cloud Heating/Cooling Identities Print Server Adminstration Consumers 3D Work Station Crowdfunding Managed IT Services Backups IT Consulting LinkedIn CIO Congratulations Video Surveillance Software as a Service Public Cloud Solid State Drive Law Firm IT Legal Windows 8.1 Update Recycling Data loss IP Address Data Breach Compliance Best Available Scam Technology Tips Sync Refrigeration Alt Codes Disaster Technology Laws Regulations YouTube Scheduling Comparison Mobile Device Managment Cost Management Typing Bluetooth Digital Signature Google Drive Online Currency Memory Unified Threat Management Laptop How To Bandwidth Computer Accessories Black Friday Productivity Cryptocurrency Wi-Fi Google Docs Documents Virtual Private Network Access Control Halloween Flexibility Entrepreneur Cyber Monday Travel Undo Bitcoin 5G Company Culture PDF Twitter People Redundancy SharePoint Scary Stories communications Touchscreen Hacks Macro Downloads SaaS Unified Communications Domains Fun Networking Multi-Factor Security Government Word Wearable Technology Gaming Console Software Tips Public Speaking Cortana Monitors eWaste Conferencing Data Security Google Calendar Telephony Deep Learning Alerts PC Care Google Wallet

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code