3 Tips on How to Spot Phishing Attacks

August 22, 2024

3 Tips on How to Spot Phishing Attacks

Phishing and Spoofing email attacks have risen by more than 200 percent since 2010.

Learn how to spot phishing and spoofing attacks in three easy to follow tips.  While there are several ways to help mitigate these types of emails from making their way into your inbox, there's never a 100% guarantee.

Tip 1: Don't trust the display name

It's easy for someone to enter a fake display name, what's in the FROM: field.

Tips on how to detect phishing and spoofing attacks

Check the email address in the header from--if it looks suspicious, don't open the email and simply delete it.

Tip 2: Inspect any links but don't click

If you hover your mouse over an embedded link (this applies to not only emails but websites too), you can see the exact place the link will take you.  For instance, I can create a link www.chase.com, but if you hover your mouse over the link, you can see that the actual address is https://itecsonline.com.Web browsers usually have the preview of the actual address the supposed link will take you to in the bottom right-hand corner.  Outlook displays the link information directly above your mouse icon.

Tip 3: Don't click on attachments

Malicious attachments can have embedded viruses, if you weren't expecting the email or attachment, don't open it.

Latest posts

How to Deploy Self-Hosting DeepSeek-R1 Using Ollama Implementation Guide
April 19, 2025

How to Deploy Self-Hosting DeepSeek-R1 Using Ollama Implementation Guide

Our Self-Hosting DeepSeek-R1 Using Ollama guide provides organizations with a comprehensive technical roadmap for deploying AI models within their own infrastructure. From hardware selection and installation to performance optimization and security hardening, this guide covers the complete implementation process with expert insights at each critical phase. Learn how to select appropriate model sizes based on your hardware capabilities, implement web interfaces for user access, and properly secure your AI deployment. This guide demonstrates how organizations can leverage powerful AI capabilities while maintaining complete data privacy and control.
Shutup10 Privacy Settings Tool
April 14, 2025

Shutup10 Privacy Settings Tool

Anyone who has configured a new installation of Windows 10 has seen there are a large amount of privacy, location and performance settings in the operating system. The sheer amount of selections available to adjust can be discouraging to even an experienced IT professional. Considering the multitude of options available it can be difficult, if almost impossible, to find them again later on - much less to remember them all! Enter O&O Software’s humorously named O&O ShutUp10.
Scam robocalls pretending to be Apple
April 14, 2025

Scam robocalls pretending to be Apple

We've received reports that customers are receiving calls from a company claiming to be Apple informing them that their Apple ID has been compromised. The culprits are calling random numbers, mainly in the United States. If you follow their prompts to "secure your account" you'll be transferred to a call center in India who will then try to get as much personal information from you as possible; they will try to get your credit card information to charge a fee to secure the compromised account.