April 6, 2018

3 Tips on How to Spot Phishing Attacks

Phishing and Spoofing email attacks have risen by more than 200 percent since 2010.

Learn how to spot phishing and spoofing attacks in three easy to follow tips.  While there are several ways to help mitigate these types of emails from making their way into your inbox, there's never a 100% guarantee.

Tip 1: Don't trust the display name

It's easy for someone to enter a fake display name, what's in the FROM: field.

Tips on how to detect phishing and spoofing attacks

Check the email address in the header from--if it looks suspicious, don't open the email and simply delete it.

Tip 2: Inspect any links but don't click

If you hover your mouse over an embedded link (this applies to not only emails but websites too), you can see the exact place the link will take you.  For instance, I can create a link www.chase.com, but if you hover your mouse over the link, you can see that the actual address is https://itecsonline.com.Web browsers usually have the preview of the actual address the supposed link will take you to in the bottom right-hand corner.  Outlook displays the link information directly above your mouse icon.

Tip 3: Don't click on attachments

Malicious attachments can have embedded viruses, if you weren't expecting the email or attachment, don't open it.

Latest Posts

September 8, 2021

How To Protect Crypto Exchange Accounts

Mitigate the chances that your crypto exchange accounts get hacked by following the tips below.‍You may have read articles of families losing their entire online Exchange accounts balances due to hackers breaching and stealing everything they own. Some of you may believe that the responsibility of these hacks is on the Exchanges, and I'm here to tell you this is usually not the case. Before you get angry, let me first explain the two types of hacks that occur that lead to you losing your entire investment.

Read More
July 16, 2021

Why End Point Detection (EDR) Offers Better Security

The rate at which new threats are being identified proves the inadequacy of traditional anti-virus software as a singular security measure. Considering its powerful and comprehensive threat-detecting abilities, SentinelOne proves to be a clear winner in any environment.

Read More
July 12, 2021

What is a Crypto Wallet and How to Secure it

There are various types of cryptocurrency wallets. The three prominent are offline, online, and those held by a custodian. Before we explain the differences between the three, it's important to note that a custodian, in this context, is an entity that holds your private key. Next, we'll go into what a private key is but first, let's dive deeper into the three types.‍

Read More

You have questions, we have answers

What can we help you with?