• Register

Data Net Blog

By accepting you will be accessing a service provided by a third-party external to

You Have to Think Before You Click

You Have to Think Before You Click

Phishing attacks are more commonplace than you might think. Whether it’s scamming someone into sending payments to fund who knows what or simply spreading malware or viruses, these phishing attacks are a part of doing business; therefore, it’s important that you take measures to avoid some of the most clever tricks in the book. Let’s examine some of them.

Defining Phishing

Phishing attacks are attacks that come in the form of actual legitimate emails. Cybercriminals try to trick users into handing over important credentials, sharing important information, and downloading malware. Phishing emails are particularly dangerous because they can seem quite real. A phishing attempt for your PayPal information could look just like your everyday PayPal message. To make matters worse, phishing emails instill a sense of urgency in their targets, spurring them to take immediate action to pay an overdue bill or change a stolen password.

How to Spot a Phishing Attack

Even the best of us can be tricked by phishing scams from time to time, and it’s all because they can take so many different forms. Thankfully, there are plenty of ways you can prepare your team to identify phishing scams. Here are some tips to consider:

  • Maintain strong, unique passwords: If your account is ever hacked, then the least you can do is make sure that the password you use for that particular account isn’t used anywhere else.
  • Check the email address in the header: Make sure that emails appearing to come from a particular domain are, in fact, actually coming from that domain. For example, whatshisname from PayPal should have an email address of [email protected] However, you need to make sure that emails aren’t coming from a subtle domain like [email protected] Of course, you have to be exceptionally careful about any messages asking you to click links or submit sensitive information.
  • Don’t automatically download attachments: Most malware will find its way onto your network through email attachments. If you haven’t specifically requested an attachment, it’s safe to say that you should be more than a little skeptical if you receive one in an inbox. If you have any reason to doubt the authenticity of the attachment, you should take a moment to reach out to the sender in an alternative form of communication and confirm that it works.
  • Look before you click: If the email has a link in it, take a moment to hover your mouse over it before you click. This gives you the true nature of the link. Here are some examples of legitimate and suspicious URLs:
    • - This is safe. That’s PayPal’s domain name.
    • - This is safe. It’s just a subpage on PayPal’s site.
    • - This is safe. A website can put letters and numbers before a dot in their domain name to lead to a specific area of their site. This is called a subdomain.
    • - This is safe. This is a subpage on PayPal’s subdomain.
    • - Uh oh, this is sketchy. Notice the dot after the .com in PayPal’s domain? That means this domain is actually, and it has the subdomain They are trying to trick you.
    • - This is still sketchy. The domain name is, and like the above example, they are trying to trick you because they made a subdomain called They are just driving you to a subpage that they called secure. This is pretty suspicious.
    • - This is really tricky! The hacker is using a URL shortening service called TinyURL. Notice how there is a .com later in the URL after PayPal’s domain? That means it’s not PayPal. Tread carefully!

Of course, all organizations handle domains differently, but these rules above should give you an idea of what to look for in illegitimate addresses.

Training your employees to identify these phishing emails will go a long way toward keeping your business secure. Data Net can help you implement solutions designed to limit the threat of phishing attempts and help your employees stay aware of the dangers. To learn more, reach out to us at (760) 466-1200.

Intro to Your Tech: Dark Web
Six Critical Small Business Mistakes to Avoid


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, August 06, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Efficiency Data Privacy Communication Hackers Smartphones Malware Innovation Cloud Small Business IT Support Hardware Email User Tips VoIp Communications Google Workplace Tips Microsoft Software Computer Mobile Device Internet Cybersecurity Managed IT Services Tech Term Users Business Management Android Hosted Solutions Business Mobile Devices Collaboration Ransomware Outsourced IT Windows 10 Cloud Computing Miscellaneous Backup Social Media Phishing Passwords Network IT Services Managed Service Upgrade Wi-Fi Apps Data Backup Information Smartphone Data recovery Saving Money Browser Networking Microsoft Office Bandwidth Applications Gadgets Wireless Internet of Things Holiday Facebook Windows Managed IT services Access Control Chrome Data Breach Employer-Employee Relationship Gmail VPN Marketing BDR Covid-19 Blockchain Patch Management Quick Tips Automation Voice over Internet Protocol Managed IT Service Remote Work Save Money Compliance Going Green Apple Laptop Mobile Office Word Value Business Intelligence Conferencing Router Company Culture Disaster Recovery Government Remote Computing Payment Cards Wireless Charging Health Social Network Excel Twitter Office Virtual Assistant Artificial Intelligence Scam Password Virtualization Healthcare Net Neutrality Content Filtering Processor Office 365 G Suite Data Protection Server Paperless Office Data Security Settings iPhone Mobility Telephony Education Bring Your Own Device Remote Monitoring RAM Data Management Remote Monitoring and Management Batteries Employee-Employer Relationship Virus Business Technology How To Retail Medical IT Windows 7 Tech Terms Cost Management Mobile Device Management Telephone System Cortana Physical Security Computers Business Continuity Connectivity Alert Vulnerability Network Attached Storage Environment Customer Service Holidays Humor Cleaning Paper Edge Payment Remote Working Processors HP Spam Wearables eCommerce Virtual Reality Movies IT budget Touchscreen File Management Eliminating Downtime Cybercrime Updates Shadow IT GDPR Chrome OS Managing Stress e-waste OneNote Law Enforcement Telecommuting Memes Ink Dongle instant Messaging Threats Inventory Employees Distribution User Tip Spyware Virtual Private Network Maintenance Document Management Plug-In Antivirus Sales Online Shopping Remote Microsoft Office 365 Current Events Congratulations Machine Learning BYOD Tactics Certification Computer Repair Streaming Media Storage Backup and Disaster Recovery PCI DSS Travel Troubleshooting disposal Windows Server 2008 R2 IT Botnet PowerPoint Vulnerabilities Scams IT Management Authentication Mobile Security Solid State Drive Fleet Management Customer Relationship Management Internet Explorer Proactive IT Staff Recycling Tablet Remote Workers Unified Communications Human Resources WannaCry WhatsApp Wireless Internet Display User Security IT Service Website Downloads Dark Web Hard Drives Regulations Compliance Server Management Update Taskbar Workers Hosted Desktop Sports Analytics Reporting Cryptocurrency Project Management Comparison Authorization Operating System Hard Disk Drive Multi-Factor Authentication Tip of the week Managed Service Provider News Threat Digital Websites Personal Information Licensing Managed Services Provider HIPAA Amazon Telecommute Training Benchmarks Voice over IP Mobile Trends Error SSD Specifications Meetings Live Streaming Hybrid Cloud Outlook Help Desk National Security File Sharing Millennials Firewall Search Microsoft Teams Video Co-Managed IT Printing Safety E-Commerce Bitcoin Knowledge Battery Management Tech Support Electronic Health Records Vendor Hard Drive Data loss Security Cameras Risk Management Recovery A.I. Lead Generation Printer Cables Profitability Database Profiles Remote Support Big Data SaaS Technology Tips Time Management Insurance Financial Thank You Printers Regulation WiFi Analysis

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123