• Register

Data Net Blog

By accepting you will be accessing a service provided by a third-party external to

If an Email Subject is Urgent, Be Skeptical

If an Email Subject is Urgent, Be Skeptical

Important Update! Urgent! Expires in 1 Day! Confirm your Email Now! Your Password Has Been Stolen!

This type of messaging is often used in some of the most disarming phishing emails. As a business owner, you and your staff need to be vigilant when it comes to catching these scams.

Phishing Attacks are a Growing Problem

When we think about hackers, we always think about technologically brilliant social outcasts sitting in front of half a dozen screens trying to digitally rob banks. That’s a fun way to portray them in television and movies, but these days it doesn’t really take a lot of technical know-how to run the most successful scams in the cybercriminal’s playbook.

In fact, cybercriminals rely less on new breakthroughs and more on new psychological ways to trick users. Why invest all that time and effort breaking through modern cybersecurity protections when you can practically ask a user to hand over their password?

Phishing attacks are prominent today because they work. Users fall for them, and you almost can’t blame them for it. A phishing email is an email that looks legitimate, and is usually spoofing a legitimate site or service.

For example, a phishing email might look like it’s coming from your bank. The from address appears (at first glance) to be coming from a real email address from your bank. It might even get filtered normally, if you already have filters in place to organize email from your bank. Clicking into the email, you’ll see your bank’s logo.

Everything will look very real and very legitimate, at first glance.

That’s why phishing attacks are so easy to fall for.

The email itself usually isn’t dangerous on its own, although it could have links to dangerous sites, or contain attachments that are dangerous. Most of the danger lies in where the email instructs the user to go.

How to Spot a Phishing Attack

First of all, if an email seems too good to be true, or extremely urgent, or it’s asking for password information that you didn’t trigger, immediately be skeptical.

  1. Carefully hover (don’t click!) over links and see if they go to a legitimate URL. If the email is from Paypal, a link should lead back to or If there is anything strange between ‘paypal’ and the ‘.com’ then something is suspicious. There should also be a forward slash (/) after the .com. If the URL was something like, then you are being spoofed. Everyone handles their domains a little differently, but use this as a general rule of thumb:
    • a. - Safe
    • b. - Safe
    • c. - Safe
    • d. - Safe
    • e. - Suspicious! (notice the dot immediately after Paypal’s domain name)
    • f. - Suspicious!
    • g. - Suspicious! Don’t trust dots after the domain!
  2. Check the email in the header. An email from Amazon wouldn’t come in as [email protected] Do a quick Google search for the email address to see if it is legitimate.
  3. Always be careful opening attachments. If there is an attachment or link on the email, be extra cautious.
  4. Be skeptical of password alerts. If the email mentions passwords, such as “your password has been stolen,” be suspicious. 

When in doubt, it’s best to be skeptical of an email. That doesn’t mean email correspondence has to be distrusted though. If your business has a solid spam-blocking solution in place, it can help weed out some (not always all) phishing attacks.

If you are getting suspicious emails and want us to take a look, give us a call at (760) 466-1200.

Ransomware is a Nasty Thing to Get
Switch the Hosted Email to Save Money


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, September 26, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Data Efficiency Communication Privacy IT Support Malware Hackers Smartphones Google Cloud Small Business User Tips Innovation Hardware Email Microsoft Workplace Tips VoIp Software Communications Users Managed IT Services Cybersecurity Computer Mobile Device Internet Collaboration Tech Term Business Business Management Hosted Solutions Android Mobile Devices Ransomware Outsourced IT Windows 10 Miscellaneous Cloud Computing Social Media Phishing Passwords Backup Managed Service Smartphone Network Browser Information IT Services Upgrade Apps Wi-Fi Saving Money Data recovery Covid-19 Data Backup Windows Gadgets Bandwidth Applications Facebook Wireless Microsoft Office Networking Internet of Things Holiday Managed IT services VPN Patch Management Compliance Remote Work BDR Blockchain Employer-Employee Relationship Access Control Gmail Chrome Marketing Data Breach Automation Apple Quick Tips Word Conferencing Router Laptop Health Voice over Internet Protocol Managed IT Service Going Green Analytics Value Office 365 Business Intelligence Mobile Office Employee-Employer Relationship Save Money Business Continuity Connectivity Remote Monitoring Wireless Charging Payment Cards Education Company Culture Disaster Recovery Government Remote Computing Social Network Paperless Office How To Office Virtual Assistant Virus Retail Virtualization Telephone System Healthcare Remote Processor Physical Security Content Filtering Net Neutrality Data Management Server G Suite Data Protection Settings Data Security Telephony Mobility Excel Tech Terms Cost Management Computers Bring Your Own Device Remote Monitoring and Management Batteries Scam RAM Business Technology Medical IT Windows 7 Twitter Artificial Intelligence Cybercrime Battery Mobile Device Management Cortana iPhone Password Document Management Antivirus Profiles Website SaaS Lead Generation Time Management Insurance Inventory Printer WhatsApp Cables Profitability Machine Learning Tactics Humor Paper Payment Backup and Disaster Recovery Remote Working Customer Service Holidays News eCommerce Wearables Virtual Reality Licensing Movies Touchscreen Processors disposal Updates Staff Shadow IT GDPR Chrome OS File Management IT Management Mobile Security Encryption Eliminating Downtime Memes Ink instant Messaging Threats Hard Drives Live Streaming Managing Stress Law Enforcement Telecommuting OneNote Maintenance Plug-In Sales Online Shopping Tech Support Microsoft Office 365 User Tip Spyware Employees Distribution Server Management Virtual Private Network Certification Digital Websites Computer Repair Streaming Media Storage Current Events Operating System Innovations BYOD Windows Server 2008 R2 Telecommute IT PowerPoint Remote Support Vulnerabilities Scams SSD PCI DSS Troubleshooting Customer Relationship Management Internet Explorer Cleaning Proactive IT Tablet Recycling Remote Workers Alert Unified Communications Vulnerability Authentication Solid State Drive Fleet Management Wireless Internet User Security Display Safety IT Service Downloads Dark Web WannaCry Human Resources Taskbar Data loss Hosted Desktop Sports Reporting Comparison Cryptocurrency Project Management Regulations Compliance Update Workers Managed Service Provider Threat Personal Information Big Data Technology Tips Authorization Tip of the week Hard Disk Drive Multi-Factor Authentication Database Amazon Voice over IP Training Benchmarks Edge Mobile Trends Error HIPAA Managed Services Provider Network Attached Storage Environment Help Desk National Security HP Spam Firewall Specifications Search IT budget Meetings Congratulations Hybrid Cloud Outlook File Sharing Millennials Co-Managed IT Printing Botnet Knowledge E-Commerce Bitcoin Management Travel Microsoft Teams Video Security Cameras Risk Management Dongle Recovery A.I. Hard Drive Electronic Health Records Vendor e-waste Financial Printers WiFi Regulation Thank You Analysis

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123