• Register

Data Net Blog

By accepting you will be accessing a service provided by a third-party external to

Tip of the Week: Warning Signs of a Phishing Scam

Tip of the Week: Warning Signs of a Phishing Scam

According to the latest edition of Microsoft’s regular Security Intelligence Report, phishing attacks are the most prevalent cyberthreat. Considering what is currently going on in the world, this is almost assuredly still the case, which means that businesses and individuals alike need to be more aware of how to spot these attempts. To help, we’ve put together a few tips.

Before we get into these warning signs, however, it is important that we mention a few things about phishing attacks.

While these signs can be a great indicator that an email is actually a malicious attempt by an attacker, the processes that some attackers use have advanced greatly over time. Spotting a phishing attack can range in difficulty from knowing that there isn’t an official trying to recruit you into assisting them in a massive money transfer in exchange for a considerable cut... all the way to knowing to look for subtle differences in the URL hidden behind a linked bit of text. 

So, keep in mind that these tips are simply meant to raise awareness as to what can indicate a phishing attempt’s presence, and that not all of these indicators will be present each time.

1. The email is written to be alarming.

The last thing someone trying to phish you wants is for you to think too much about it. In order to keep you off-balance, many phishing attacks are written to inspire a jolt of panic. This way, the targeted user is more likely to take the message at face value and seek a way out, setting the hook. Rather than allowing your emotions to be manipulated against you, take a few moments and observe the situation before deciding how to proceed. Check the details of the message for truth or accuracy.

2. The email includes a .zip file.

Cybercriminals will often send malware packaged into a .zip file, and phish the recipient into opening it. While .zip files were once useful as a means for sending large files, cloud technology and other means have largely left them redundant. While they still have their uses, be cautious about opening any you may receive in your email.

3. The email address/URL is incorrect.

This one is something you may have to look closely for. It isn’t often anymore that people pay too much attention to the actual email address of a received message, which many attackers will take advantage of by making small changes to the URL that can be easy to miss. For instance, combining an “r” and an “n” appears as “rn”... pretty easy to see as an “m” if you aren’t careful. Attackers will sometimes do this to convince you of a message’s legitimacy. It is also quite easy for these cybercriminals to make the links in their messages appear to direct someplace else, encouraging you to click through them. Hover your cursor over any link to see where it actually goes before you click it.

4. The email is impersonal and sloppy.

Here’s the thing, companies today understand that they need to make a good impression in their emails, so they will almost certainly be using spellcheck liberally as they write their legitimate messages. They will also be sure to do their best to make the message feel as personal as they can. While everyone knows that each email isn’t custom-written to each person it is sent to, that little bit of personalization makes the recipient feel acknowledged and is simple enough for these companies to automate. Therefore, professional emails with sterile, impersonal language, generic terms, and (less commonly today) incorrect language are a pretty significant sign that an email may not be from who it says it’s from.

While this isn’t a full list of things to watch out for to prevent phishing, it is a good start.

To learn more about how you can help protect your business from phishing and other cyberthreats, reach out to Data Net by calling (760) 466-1200.

Should You Really Trust Your Staff?
Does Miscommunication Increase with a Remote Workf...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, May 24, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Data Efficiency Privacy Malware Hackers IT Support Innovation Communication Smartphones User Tips Small Business Google Computer Hardware Email Microsoft Software Users Workplace Tips VoIp Communications Tech Term Cloud Managed IT Services Mobile Device Business Management Internet Cybersecurity Android Mobile Devices Business Outsourced IT Collaboration Windows 10 Ransomware Cloud Computing Backup Miscellaneous Hosted Solutions IT Services Passwords Social Media Saving Money Phishing Data Backup Managed Service Upgrade Apps Network Wi-Fi Data recovery Information Browser Internet of Things Windows Bandwidth Holiday Microsoft Office Gadgets Smartphone Facebook Applications Networking Gmail Marketing Wireless Access Control Chrome VPN BDR Managed IT services Blockchain Employer-Employee Relationship Patch Management Quick Tips Save Money Laptop Apple Compliance Router Value Going Green Managed IT Service Business Intelligence Word Mobile Office Automation Medical IT Telephony Telephone System Windows 7 Physical Security Artificial Intelligence Password Business Continuity Connectivity Business Technology Excel Payment Cards Company Culture Disaster Recovery Health Social Network Voice over Internet Protocol Scam Data Breach Paperless Office Cortana Conferencing Government Remote Computing Healthcare Wireless Charging Processor Net Neutrality Data Management Office Virtual Assistant iPhone G Suite Data Security Virtualization Education Mobility Remote Monitoring Tech Terms Cost Management Office 365 Computers Bring Your Own Device Remote Monitoring and Management Data Protection Virus Batteries RAM How To Settings Retail Employee-Employer Relationship Hybrid Cloud Outlook WannaCry Tech Support Help Desk National Security HP Spam Firewall User Security Search IT budget Twitter Video Mobile Device Management Cybercrime Co-Managed IT Printing Workers E-Commerce Bitcoin Microsoft Teams Comparison e-waste Tip of the week Security Cameras Risk Management Dongle Recovery A.I. Remote Support Electronic Health Records Vendor Cables Profitability HIPAA Alert Vulnerability Document Management Antivirus Profiles SaaS Voice over IP Cleaning Time Management Insurance Inventory Customer Service Holidays Machine Learning Tactics Humor Paper File Sharing Millennials Payment Backup and Disaster Recovery Specifications disposal Wearables Virtual Reality Movies Touchscreen Knowledge Battery Eliminating Downtime Hard Drive Updates Staff Shadow IT GDPR Chrome OS File Management IT Management Mobile Security Lead Generation OneNote Memes Ink instant Messaging Threats Hard Drives Managing Stress Server Management Virtual Private Network Maintenance Plug-In Congratulations Analytics Remote Microsoft Office 365 Employees Distribution BYOD Processors Travel Certification Digital Websites Computer Repair Streaming Media Storage eCommerce Botnet Current Events Operating System Windows Server 2008 R2 Telecommute IT PowerPoint Vulnerabilities Scams SSD Troubleshooting Fleet Management Customer Relationship Management Internet Explorer Proactive IT Law Enforcement Telecommuting WhatsApp Recycling Remote Workers Unified Communications Authentication Website Solid State Drive Wireless Internet User Tip Spyware Display Safety IT Service Downloads Dark Web Sales Online Shopping Human Resources Update Content Filtering Licensing Taskbar Data loss Hosted Desktop Sports Reporting News Cryptocurrency Project Management Hard Disk Drive Multi-Factor Authentication Database Managed Service Provider Threat Personal Information Big Data Technology Tips Covid-19 Authorization Server Amazon Live Streaming Training Benchmarks Edge Mobile Trends Error Tablet Managed Services Provider Network Attached Storage Environment WiFi Analysis Thank You Financial Printers Regulation

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123