• Register

Data Net Blog

You Have to Think Before You Click

You Have to Think Before You Click

Phishing attacks are more commonplace than you might think. Whether it’s scamming someone into sending payments to fund who knows what or simply spreading malware or viruses, these phishing attacks are a part of doing business; therefore, it’s important that you take measures to avoid some of the most clever tricks in the book. Let’s examine some of them.

Defining Phishing

Phishing attacks are attacks that come in the form of actual legitimate emails. Cybercriminals try to trick users into handing over important credentials, sharing important information, and downloading malware. Phishing emails are particularly dangerous because they can seem quite real. A phishing attempt for your PayPal information could look just like your everyday PayPal message. To make matters worse, phishing emails instill a sense of urgency in their targets, spurring them to take immediate action to pay an overdue bill or change a stolen password.

How to Spot a Phishing Attack

Even the best of us can be tricked by phishing scams from time to time, and it’s all because they can take so many different forms. Thankfully, there are plenty of ways you can prepare your team to identify phishing scams. Here are some tips to consider:

  • Maintain strong, unique passwords: If your account is ever hacked, then the least you can do is make sure that the password you use for that particular account isn’t used anywhere else.
  • Check the email address in the header: Make sure that emails appearing to come from a particular domain are, in fact, actually coming from that domain. For example, whatshisname from PayPal should have an email address of [email protected] However, you need to make sure that emails aren’t coming from a subtle domain like [email protected] Of course, you have to be exceptionally careful about any messages asking you to click links or submit sensitive information.
  • Don’t automatically download attachments: Most malware will find its way onto your network through email attachments. If you haven’t specifically requested an attachment, it’s safe to say that you should be more than a little skeptical if you receive one in an inbox. If you have any reason to doubt the authenticity of the attachment, you should take a moment to reach out to the sender in an alternative form of communication and confirm that it works.
  • Look before you click: If the email has a link in it, take a moment to hover your mouse over it before you click. This gives you the true nature of the link. Here are some examples of legitimate and suspicious URLs:
    • - This is safe. That’s PayPal’s domain name.
    • - This is safe. It’s just a subpage on PayPal’s site.
    • - This is safe. A website can put letters and numbers before a dot in their domain name to lead to a specific area of their site. This is called a subdomain.
    • - This is safe. This is a subpage on PayPal’s subdomain.
    • - Uh oh, this is sketchy. Notice the dot after the .com in PayPal’s domain? That means this domain is actually, and it has the subdomain They are trying to trick you.
    • - This is still sketchy. The domain name is, and like the above example, they are trying to trick you because they made a subdomain called They are just driving you to a subpage that they called secure. This is pretty suspicious.
    • - This is really tricky! The hacker is using a URL shortening service called TinyURL. Notice how there is a .com later in the URL after PayPal’s domain? That means it’s not PayPal. Tread carefully!

Of course, all organizations handle domains differently, but these rules above should give you an idea of what to look for in illegitimate addresses.

Training your employees to identify these phishing emails will go a long way toward keeping your business secure. Data Net can help you implement solutions designed to limit the threat of phishing attempts and help your employees stay aware of the dangers. To learn more, reach out to us at (760) 466-1200.

Intro to Your Tech: Dark Web
Six Critical Small Business Mistakes to Avoid


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, September 19, 2019

Captcha Image

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Productivity Malware Privacy Data User Tips Hackers Efficiency Communication Tech Term Microsoft Google Smartphones Internet Hardware Communications Mobile Device Computer Innovation IT Support Email Windows 10 Cybersecurity VoIp Software Ransomware Android Users Cloud Small Business Managed IT Services Business Management Business Network Browser Passwords Mobile Devices Social Media Workplace Tips IT Services Collaboration Outsourced IT Cloud Computing Information Wi-Fi Internet of Things Miscellaneous Applications Hosted Solutions Smartphone Holiday Windows Blockchain Managed IT services Data recovery Upgrade Chrome Microsoft Office Employer-Employee Relationship Data Backup Backup Gmail Gadgets Wireless Apps Bandwidth Patch Management Saving Money Value Business Intelligence Access Control Networking Save Money Word Marketing Managed Service Laptop Virus How To Paperless Office Compliance VPN BDR Cortana Router G Suite Data Management Physical Security Phishing Government Remote Computing Wireless Charging Managed IT Service Tech Terms Cost Management Excel Office Virtual Assistant RAM Computers Facebook Virtualization Remote Monitoring and Management Automation Healthcare Scam Data Breach Medical IT Net Neutrality Office 365 Processor Data Protection Quick Tips Settings Artificial Intelligence Data Security Connectivity Telephony Password Mobility Company Culture Voice over Internet Protocol File Sharing Millennials Managing Stress IT Management Help Desk Mobile Security National Security Specifications Ink Staff Windows 7 Microsoft Office 365 Hard Drives Video Retail Knowledge Battery Maintenance Plug-In E-Commerce Bitcoin Live Streaming Hard Drive Streaming Media Analytics Storage Electronic Health Records Telephone System Server Management BYOD Security Cameras Risk Management Tech Support Time Management Troubleshooting Business Continuity Operating System Conferencing Lead Generation PowerPoint Digital Websites Unified Communications Authentication SSD Customer Service Remote Support Internet Explorer Proactive IT Telecommute Payment Payment Cards Processors Downloads Dark Web Health Cleaning eCommerce Wireless Internet Wearables Alert Vulnerability Reporting Safety Chrome OS Bring Your Own Device Update Updates Sports Law Enforcement Telecommuting Authorization OneNote Threat Data loss instant Messaging User Tip Spyware Trends Big Data Error Technology Tips Employees Sales Online Shopping Amazon Database Going Green Edge Hybrid Cloud Network Attached Storage Outlook Certification Environment Apple Content Filtering Microsoft Teams IT budget Twitter Windows Server 2008 R2 Server Printing HP Spam Vulnerabilities Congratulations A.I. Solid State Drive Botnet Tablet Cybercrime Recycling Travel SaaS Dongle Human Resources User Security Cables Profitability e-waste Display iPhone WannaCry WhatsApp Workers Inventory Taskbar Website Comparison Paper Document Management Antivirus Cryptocurrency Tip of the week Movies Touchscreen Backup and Disaster Recovery Hard Disk Drive Remote Monitoring Machine Learning Personal Information Tactics Batteries Education HIPAA GDPR Employee-Employer Relationship News Business Technology Voice over IP Eliminating Downtime Training disposal Benchmarks Licensing Printers WiFi Regulation Financial Thank You Analysis Disaster Recovery

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123