April 6, 2018

3 Tips on How to Spot Phishing Attacks

Phishing and Spoofing email attacks have risen by more than 200 percent since 2010.

Learn how to spot phishing and spoofing attacks in three easy to follow tips.  While there are several ways to help mitigate these types of emails from making their way into your inbox, there's never a 100% guarantee.

Tip 1: Don't trust the display name

It's easy for someone to enter a fake display name, what's in the FROM: field.

Tips on how to detect phishing and spoofing attacks

Check the email address in the header from--if it looks suspicious, don't open the email and simply delete it.

Tip 2: Inspect any links but don't click

If you hover your mouse over an embedded link (this applies to not only emails but websites too), you can see the exact place the link will take you.  For instance, I can create a link www.chase.com, but if you hover your mouse over the link, you can see that the actual address is https://itecsonline.com.Web browsers usually have the preview of the actual address the supposed link will take you to in the bottom right-hand corner.  Outlook displays the link information directly above your mouse icon.

Tip 3: Don't click on attachments

Malicious attachments can have embedded viruses, if you weren't expecting the email or attachment, don't open it.

Latest Posts

January 7, 2021

Protecting Your Company Against Ransomware

Ransomware is becoming more common due to the success the creators are enjoying due to the improvement of their methods. What were once simple text-based phishing emails are becoming very realistic looking “corporate” fakes.

Read More
December 28, 2020

G Suite VS Office 365

G-Suite or Office 365 this is the question that has stumped small to medium-sized business owners for years. Now businesses are looking to move into the cloud and need to know where to start and who to use. Some of the most important factors to consider are security, integration, functionality, and usability.

Read More
November 12, 2020

Why You Should Use a Password Manager, and How to Get Started

The majority of people use weak or reuse passwords on different websites. How can someone use a complex, unique password on all of the websites and applications you use? The answer is a password manager.

Read More

You have questions, we have answers

What can we help you with?