312-253-4321    Get SUPPORT

Alchetec Blog

Tip of the Week: Spotting a Phishing Attempt

Tip of the Week: Spotting a Phishing Attempt

With email being such a huge part of doing business, phishing has become a favorite tool of many scammers. To fight back, it is key that you know how to recognize a phishing email, so we’re dedicating this week’s tip to doing just that.

What is Phishing?

Phishing goes beyond just your email. The term actually covers any digital attempt that someone makes to trick you into revealing important information about your business or personal accounts. A ‘phisher’ would try to fool you into handing over a particular detail about yourself, like the password you use for your online banking, or your business’ client and personnel files.

Of course, a scammer doesn’t have to use email as their preferred phishing tool. With social media becoming such a big part of business and personal life, phishers will pose as people you know and message you to try and extract information. Others will just pick up the phone and call you as someone else, hoping you won’t question them and hand over the information they want.

These different methods that a scammer might use can even classify the attempt into a more precise type of phishing. Attacks that are highly customized to one particular target are called “spear” phishing attacks, while those that pose as the CEO of a company are called “whaling.”

Regardless of what kind of phishing it is, it ultimately relies on deception to work, more than any other factor.

Spotting Phishing

Fortunately, while some phishing scams are getting to be pretty elaborate, there are a few practices that can help prevent you from being fooled. Here, we’ve put them together to give you a simple guide to avoiding potential phishing attacks.

Warning Signs

There are plenty of warning signs to help you spot a phishing attack. Some are found in the body of the email itself, while others are actually based a little bit in behaviors. For instance:

Is the message filled with spelling and grammar issues? Think about it this way: does it look good for a business to send out official correspondence with these kinds of avoidable errors? Mind you, we aren’t referring to the occasional typo, rather the tone of the message as a whole. It certainly does not, which suggests that the message may not be legitimate.

Is the message written to make you panic about something? Consider how many phishing messages are framed: “Oh no, you have an immediate issue with something so we need you to confirm your access credentials so that this immediate issue can be resolved. Otherwise, there will be huge consequences.” While there are a variety of ways that people can be convinced, these types of messages hit on some major ones: striking quickly to keep people from questioning you, removing power from someone who wouldn’t listen to you, and using very definitive and final terms. Does the message do these things, suddenly alerting you to a terrible issue that only the sender can protect you from? If so, there is a good chance that it is a scam.

Is the message a typical occurrence in general? Finally, think about the average case when a message like this is received. If you were to suddenly get a message on social media from someone who you really don’t talk to, it’d be a little weird, right? The same goes for your business communications… how often would this supposed sender actually reach out for this?

Protecting Your Assets

Fortunately, there are a few simple ways to help reduce how effective these attacks can be.

  • Use a spam blocking solution to help reduce the number of phishing messages your employees need to deal with. While many phishers have become more sophisticated, plenty are still keeping it simple enough to be stopped automatically.

  • Make sure your employees are trained to spot and properly handle attempts that may come through. By starting with the end user, you’re taking away a lot of the power that phishing has.

At Alchetec, we appreciate the importance of secure workplace practices. If you’d like to learn more about phishing, and how we can help stop it from hurting your business, reach out to us at 312-253-4321.

Voice over Internet Protocol is a Valuable Tool
Are You Wasting Money on Cloud Services?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, April 09 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Productivity Business Computing Cloud Network Security Data Data Backup IT Services Privacy Hosted Solutions Software Malware IT Support Email Hackers Outsourced IT Internet Microsoft Data Recovery Innovation Computer Business Hardware Efficiency Business Continuity Managed IT Services Productivity Cloud Computing Backup User Tips Ransomware Upgrade Tech Term Mobile Devices Small Business Cybersecurity Google Managed IT Services Phishing Collaboration Windows 10 Communication Business Management Workplace Tips IT Support VoIP Android Paperless Office Smartphones Remote Monitoring Office 365 Disaster Recovery Data Management Managed Service Managed Service Provider Mobile Device Managed IT Smartphone Server Communications Internet of Things Passwords Facebook Encryption Network Save Money Quick Tips Browser BDR Virtualization Miscellaneous Help Desk Holiday Social Media Artificial Intelligence Wi-Fi Business Technology BYOD Healthcare Compliance Saving Money Windows 7 Government Windows 10 Document Management Windows Applications Training Microsoft Office Employer-Employee Relationship Automation Password Vendor Management Risk Management Laptops Information Office Infrastructure SaaS Data loss Storage Apps Tip of the week Avoiding Downtime Telephone Systems File Sharing Bandwidth Unified Threat Management Recovery Mobility Antivirus Redundancy Processor Going Green Vulnerability Maintenance IT Management Scam Analytics Project Management Chrome Blockchain Bring Your Own Device Virtual Private Network IT Service Work/Life Balance Data Security Hosted Solution Computers Robot Firewall Company Culture Software as a Service Computing Tablet Gmail Gadgets App Customer Relationship Management Big Data Files Users Website Meetings OneDrive Money Router Data Storage RMM Word Regulations Wireless Politics VPN Mobile Device Management Machine Learning Two-factor Authentication IoT Access Control Virtual Reality Downtime Electronic Medical Records Managed Services Cooperation Digital Payment Mobile Security Augmented Reality Outlook Identity Theft Upgrades Licensing Monitoring The Internet of Things Recycling Display Assessment Alert Utility Computing Electronic Health Records Dark Web How To Consulting Patch Management Apple Time Management Social Network How To Monitors Proactive Consultation Samsung Unified Communications Uninterrupted Power Supply Customer Service Employees Managed Services Provider Smart Technology Search Employee-Employer Relationship Network Management File Management Management Chromebook Remote Monitoring and Management Net Neutrality Payment Cards HIPAA Settings Twitter Professional Services Server Management Flexibility Remote Workers Health Co-Managed IT Operating System Networking Social Internet Exlporer Hard Drive Solid State Drive Remote Computing Printing Computer Care WannaCry Office Tips Finance Hard Disk Drives Specifications Automobile Proactive Maintenance Business Telephone Managed IT Service Cookies Remote Worker Data Breach Mobile Bookmarks Emoji Optimization Social Networking Fleet Tracking Tech Terms Google Drive User Management Cache Taxes Hard Disk Drive Mobile VoIP Mirgation Tech Support High-Speed Internet Spyware Human Error Firefox IT Solutions Processors Current Events Biometric Permissions Wireless Technology Star Wars 5G Features Wasting Time Statistics SharePoint IBM Authentication Mail Merge USB Database Management IT Assessment Break Fix Nanotechnology Safety ROI Technology Laws Legal Law Enforcement Vendor Staff Unsupported Software Favorites Teamwork Shortcut Private Cloud Solid State Drives Virtual Machines Black Friday Motherboard Hacker Asset Tracking Theft Techology Personal Information Batteries Hotspot Update Cyber security Migration Development MSP Permission Lenovo Projects Gamification Fraud Disaster 3D Printing Database Bluetooth Downloads Operations Managing Stress WiFi VoIP Dark Data Authorization Address GDPR Digitize Screen Reader Software Tips Notes Heating/Cooling Unified Threat Management Gadget Smart Devices Mobile Data Conferencing Shared resources Technology Tips Options Credit Cards Cyber Monday Mobile Computing Social Engineering OneNote Financial Disaster Resistance Virus Remote Work Language eWaste Multi-Factor Security Chatbots Cables Test Superfish Return on Investment Cybercrime Cyberattacks Voice over Internet Protocol Wearable Technology Enterprise Content Management GPS YouTube Black Market Shadow IT Data Warehousing Smart Tech PowerPoint Servers User Error Sensors Mouse Wireless Internet Holidays Google Maps Procurement Proactive IT Computer Repair Crowdsourcing Computing Infrastructure Information Technology Hacking Google Calendar Botnet Windows Server 2008 Identity Supercomputer Notifications Active Directory Cost Management Travel Read Only Spam Vulnerabilities Tracking Network Congestion Wires Zero-Day Threat Physical Security Outsourcing Microsoft Excel Connectivity Content Filtering History Point of Sale Printer Sports Corporate Profile Humor Instant Messaging Manufacturing Comparison Business Growth Employer/Employee Relationships IT Distributed Denial of Service Modem Security Cameras Touchscreen IT Consulting Value of Managed Services Alerts Enterprise Resource Planning Transportation Trending Legislation IT Budget End of Support WPA3 Windows Server Cortana Telephone IT Technicians Geography Digital Education Backup and Disaster Recovery Bitcoin Video Conferencing G Suite Cabling E-Commerce Virtual Assistant Websites Telephony Lithium-ion battery Students Relocation Regulation Hiring/Firing Staffing Sync Marketing Fun IT Consultant Budget CrashOverride Competition Mobile Device Managment Error IP Address Administrator Outsource IT Hard Drives Public Cloud Mobile Office Laptop Domains Cleaning Hacks Public Speaking Motion Sickness Printers Emergency Presentation