• Register

Data Net Blog

You Have to Think Before You Click

You Have to Think Before You Click

Phishing attacks are more commonplace than you might think. Whether it’s scamming someone into sending payments to fund who knows what or simply spreading malware or viruses, these phishing attacks are a part of doing business; therefore, it’s important that you take measures to avoid some of the most clever tricks in the book. Let’s examine some of them.

Defining Phishing

Phishing attacks are attacks that come in the form of actual legitimate emails. Cybercriminals try to trick users into handing over important credentials, sharing important information, and downloading malware. Phishing emails are particularly dangerous because they can seem quite real. A phishing attempt for your PayPal information could look just like your everyday PayPal message. To make matters worse, phishing emails instill a sense of urgency in their targets, spurring them to take immediate action to pay an overdue bill or change a stolen password.

How to Spot a Phishing Attack

Even the best of us can be tricked by phishing scams from time to time, and it’s all because they can take so many different forms. Thankfully, there are plenty of ways you can prepare your team to identify phishing scams. Here are some tips to consider:

  • Maintain strong, unique passwords: If your account is ever hacked, then the least you can do is make sure that the password you use for that particular account isn’t used anywhere else.
  • Check the email address in the header: Make sure that emails appearing to come from a particular domain are, in fact, actually coming from that domain. For example, whatshisname from PayPal should have an email address of [email protected] However, you need to make sure that emails aren’t coming from a subtle domain like [email protected] Of course, you have to be exceptionally careful about any messages asking you to click links or submit sensitive information.
  • Don’t automatically download attachments: Most malware will find its way onto your network through email attachments. If you haven’t specifically requested an attachment, it’s safe to say that you should be more than a little skeptical if you receive one in an inbox. If you have any reason to doubt the authenticity of the attachment, you should take a moment to reach out to the sender in an alternative form of communication and confirm that it works.
  • Look before you click: If the email has a link in it, take a moment to hover your mouse over it before you click. This gives you the true nature of the link. Here are some examples of legitimate and suspicious URLs:
    • - This is safe. That’s PayPal’s domain name.
    • - This is safe. It’s just a subpage on PayPal’s site.
    • - This is safe. A website can put letters and numbers before a dot in their domain name to lead to a specific area of their site. This is called a subdomain.
    • - This is safe. This is a subpage on PayPal’s subdomain.
    • - Uh oh, this is sketchy. Notice the dot after the .com in PayPal’s domain? That means this domain is actually, and it has the subdomain They are trying to trick you.
    • - This is still sketchy. The domain name is, and like the above example, they are trying to trick you because they made a subdomain called They are just driving you to a subpage that they called secure. This is pretty suspicious.
    • - This is really tricky! The hacker is using a URL shortening service called TinyURL. Notice how there is a .com later in the URL after PayPal’s domain? That means it’s not PayPal. Tread carefully!

Of course, all organizations handle domains differently, but these rules above should give you an idea of what to look for in illegitimate addresses.

Training your employees to identify these phishing emails will go a long way toward keeping your business secure. Data Net can help you implement solutions designed to limit the threat of phishing attempts and help your employees stay aware of the dangers. To learn more, reach out to us at (760) 466-1200.

Intro to Your Tech: Dark Web
Six Critical Small Business Mistakes to Avoid


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, November 15, 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Network Security Business Computing Data Productivity Malware Hackers Privacy Microsoft Efficiency Google User Tips Communication Tech Term Smartphones Email Innovation Hardware Cybersecurity Computer Communications IT Support Internet Mobile Device Software Users VoIp Android Windows 10 Cloud Small Business Ransomware Workplace Tips Managed IT Services Collaboration Mobile Devices Business Management IT Services Business Outsourced IT Network Passwords Social Media Browser Miscellaneous Hosted Solutions Data Backup Information Backup Internet of Things Wi-Fi Smartphone Data recovery Applications Apps Cloud Computing Wireless Windows Chrome Microsoft Office Upgrade Bandwidth Holiday Managed IT services Gadgets Blockchain Managed Service Employer-Employee Relationship Gmail Marketing Access Control Save Money Laptop VPN Value Word Managed IT Service Business Intelligence Patch Management Saving Money Phishing Networking Compliance Artificial Intelligence Excel Password Business Continuity G Suite Payment Cards Scam Data Breach Apple Paperless Office Cortana Remote Monitoring and Management Router RAM Healthcare Going Green Wireless Charging Net Neutrality Government Remote Computing Processor BDR Data Management Medical IT Office Virtual Assistant Quick Tips Data Security Virtualization Mobility Tech Terms Cost Management Connectivity Virus How To Facebook Company Culture Office 365 Batteries Computers Employee-Employer Relationship Automation Data Protection Voice over Internet Protocol Settings Physical Security Telephony Maintenance Comparison Plug-In Alert Vulnerability Electronic Health Records Vendor Cybercrime Workers Microsoft Office 365 Cleaning Security Cameras Risk Management BYOD Time Management Insurance e-waste Streaming Media Tip of the week Storage Dongle Inventory PowerPoint HIPAA Customer Service Document Management Antivirus Business Technology Voice over IP Troubleshooting Payment Internet Explorer Specifications Proactive IT Health Machine Learning Tactics File Sharing Unified Communications Millennials Authentication Wearables Backup and Disaster Recovery Knowledge Battery Wireless Internet Chrome OS File Management disposal Downloads Dark Web Updates Threats IT Management Mobile Security Sports Reporting Congratulations Hard Drive OneNote Staff Bring Your Own Device Update instant Messaging Threat Conferencing Lead Generation Travel Employees Authorization Botnet Hard Drives Amazon iPhone Current Events Server Management Trends Error Certification Analytics Vulnerabilities Scams Operating System Processors WhatsApp Windows Server 2008 R2 Digital Websites Hybrid Cloud eCommerce Outlook Website Printing Education Solid State Drive Telecommute Microsoft Teams Remote Monitoring Recycling SSD Licensing Human Resources Mobile Office Law Enforcement A.I. Telecommuting News Display Cryptocurrency Project Management User Tip SaaS Spyware Taskbar Safety Sales Cables Online Shopping Profitability Paper Content Filtering Live Streaming Hard Disk Drive Data loss Retail Personal Information Server Tech Support Managed Services Provider Database Movies Touchscreen Telephone System Training Benchmarks Big Data Technology Tips Windows 7 Search Network Attached Storage Environment GDPR Help Desk National Security Edge Tablet Eliminating Downtime IT budget Twitter Ink WannaCry Video HP Spam User Security Managing Stress Remote Support E-Commerce Bitcoin Regulation Thank You Financial Analysis Disaster Recovery WiFi Printers

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123