Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Tip of the Week: Spotting a Phishing Attempt

Tip of the Week: Spotting a Phishing Attempt

With email being such a huge part of doing business, phishing has become a favorite tool of many scammers. To fight back, it is key that you know how to recognize a phishing email, so we’re dedicating this week’s tip to doing just that.

What is Phishing?

Phishing goes beyond just your email. The term actually covers any digital attempt that someone makes to trick you into revealing important information about your business or personal accounts. A ‘phisher’ would try to fool you into handing over a particular detail about yourself, like the password you use for your online banking, or your business’ client and personnel files.

Of course, a scammer doesn’t have to use email as their preferred phishing tool. With social media becoming such a big part of business and personal life, phishers will pose as people you know and message you to try and extract information. Others will just pick up the phone and call you as someone else, hoping you won’t question them and hand over the information they want.

These different methods that a scammer might use can even classify the attempt into a more precise type of phishing. Attacks that are highly customized to one particular target are called “spear” phishing attacks, while those that pose as the CEO of a company are called “whaling.”

Regardless of what kind of phishing it is, it ultimately relies on deception to work, more than any other factor.

Spotting Phishing

Fortunately, while some phishing scams are getting to be pretty elaborate, there are a few practices that can help prevent you from being fooled. Here, we’ve put them together to give you a simple guide to avoiding potential phishing attacks.

Warning Signs

There are plenty of warning signs to help you spot a phishing attack. Some are found in the body of the email itself, while others are actually based a little bit in behaviors. For instance:

Is the message filled with spelling and grammar issues? Think about it this way: does it look good for a business to send out official correspondence with these kinds of avoidable errors? Mind you, we aren’t referring to the occasional typo, rather the tone of the message as a whole. It certainly does not, which suggests that the message may not be legitimate.

Is the message written to make you panic about something? Consider how many phishing messages are framed: “Oh no, you have an immediate issue with something so we need you to confirm your access credentials so that this immediate issue can be resolved. Otherwise, there will be huge consequences.” While there are a variety of ways that people can be convinced, these types of messages hit on some major ones: striking quickly to keep people from questioning you, removing power from someone who wouldn’t listen to you, and using very definitive and final terms. Does the message do these things, suddenly alerting you to a terrible issue that only the sender can protect you from? If so, there is a good chance that it is a scam.

Is the message a typical occurrence in general? Finally, think about the average case when a message like this is received. If you were to suddenly get a message on social media from someone who you really don’t talk to, it’d be a little weird, right? The same goes for your business communications… how often would this supposed sender actually reach out for this?

Protecting Your Assets

Fortunately, there are a few simple ways to help reduce how effective these attacks can be.

  • Use a spam blocking solution to help reduce the number of phishing messages your employees need to deal with. While many phishers have become more sophisticated, plenty are still keeping it simple enough to be stopped automatically.

  • Make sure your employees are trained to spot and properly handle attempts that may come through. By starting with the end user, you’re taking away a lot of the power that phishing has.

At 415 IT, we appreciate the importance of secure workplace practices. If you’d like to learn more about phishing, and how we can help stop it from hurting your business, reach out to us at (415) 295-4898.

Voice over Internet Protocol is a Valuable Tool
Are You Wasting Money on Cloud Services?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 07 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://web.415it.com/

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Productivity Technology Best Practices Business Computing Data Backup Data Network Security IT Support Privacy Hosted Solutions IT Services Cloud Data Recovery Efficiency Software Business Internet Email Managed IT Services Outsourced IT Malware Innovation Tech Term Small Business Cloud Computing Upgrade Hackers Hardware Windows 10 Computer Microsoft Cybersecurity Business Management User Tips Collaboration Mobile Devices Phishing Business Continuity Google Communication VoIp Workplace Tips Mobile Device Ransomware Managed Service Backup Managed Service Provider Quick Tips Android Paperless Office Smartphones Encryption Communications Server Smartphone Office 365 Disaster Recovery Browser Remote Monitoring Data Management Managed IT Business Technology Healthcare Internet of Things Windows 7 Passwords Compliance Network BDR Artificial Intelligence Holiday Vulnerability Remote Work Saving Money Wi-Fi Laptops Government Save Money Document Management Managed IT services Microsoft Office Applications Data Security Users Miscellaneous Social Media Facebook Help Desk Bandwidth Automation Tip of the week Blockchain Vendor Management Project Management Employer-Employee Relationship Virtualization Avoiding Downtime Information Antivirus Two-factor Authentication Processor Health Redundancy Scam Machine Learning Office Website Access Control BYOD Mobility Employee-Employer Relationship Virtual Private Network Training Company Culture Windows OneDrive Infrastructure IT Management IoT Software as a Service Regulations Covid-19 Hard Drive RMM Customer Relationship Management Data Loss Proactive Chrome Maintenance Meetings Storage Router Analytics VPN Time Management Remote Monitoring and Management File Management Financial Networking Operating System Flexibility Search Mobile Security Payment Cards Unified Threat Management Employees Unified Communications Electronic Health Records Files Recycling Information Technology Consulting Downtime Gmail Data Storage Professional Services The Internet of Things Managed Services Risk Management Managed Services Provider Cooperation Server Management Apps Social Network Word Remote Workers Net Neutrality Gadgets Patch Management Data Breach Assessment Management Tablet Mobile Office File Sharing Dark Web Augmented Reality Network Management Internet Exlporer Password Alert Consultation Smart Technology Co-Managed IT Monitoring Computing Remote Worker HIPAA Utility Computing Bring Your Own Device Screen Reader Emergency Notes Multi-Factor Security Authorization IT Identity Outlook Disaster Resistance Features Firewall Peripheral Printer Proactive Maintenance Solid State Drive Politics Optimization Remote Computing User Management Comparison Licensing Laptop Heating/Cooling Modem High-Speed Internet Private Cloud Data Warehousing Trending Tech Support Voice over Internet Protocol Projects How To Test Technology Tips Video Conferencing G Suite Unified Threat Management Solid State Drives Statistics Smart Tech PowerPoint Display WPA3 Legislation Business Telephone Mobile Shortcut Proactive IT Value of Managed Services Procurement Distributed Denial of Service PCI DSS Development Cybercrime Cyber security Instant Messaging Virtual Machines Teamwork Specifications Remote Working Servers Telephone Bookmarks ROI Operations IT Technicians Cost Management Lenovo Return on Investment Digital Payment Hotspot Biometric Motherboard Chromebook Options Bluetooth Connectivity Samsung Fleet Tracking Zero-Day Threat IT Assessment Recovery IT Consulting Cyberattacks Social Managed IT Service Cookies Cables SharePoint Database Management Customer Service Credit Cards Migration eWaste Shared resources Going Green Mobile Device Management Black Friday Budget 5G Mobile VoIP Favorites Money Superfish Settings Personal Information Wireless Mouse Language Gamification Vulnerabilities Mail Merge User Error Break Fix Virtual Assistant Bitcoin Asset Tracking Backup and Disaster Recovery Digitize Managing Stress Manufacturing Vendor Read Only Security Cameras Nanotechnology Wires Downloads GDPR MSP Finance Permissions Computers Chatbots Batteries Point of Sale Tech Terms Cyber Monday Staff Websites Address WiFi Wireless Internet Big Data Conferencing Microsoft Excel Windows Server 2008 Mirgation Transportation Active Directory Computing Infrastructure Mobile Computing Wearable Technology Star Wars Wasting Time Current Events Human Error Shadow IT Spam Enterprise Content Management Smart Devices Printing App Authentication Google Calendar Fraud Holidays Identity Theft Enterprise Resource Planning Techology CIO applications E-Commerce Theft SaaS Employer/Employee Relationships Apple Cache Windows Server Electronic Medical Records Alerts Outsource IT Geography Virtual Reality Touchscreen Hacking Database OneNote Permission Travel Outsourcing Social Networking Technology Laws Hard Disk Drives Sensors CEO Students Daniel Stevens Regulation Twitter Marketing CRM Printers Education

Latest Blog

Your data is vital for your organization’s continuity. Your data consists of everything from your company documents, accounting records, client contact information, prospects and leads, procedures, and everything else needed for you to keep operations running smoothly. That’...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...