• Skip to main content
  • Skip to footer

610-978-5160

  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
Nettology logo

Nettology

IT Experts in Philadelphia. AWS Cisco Vmware Consulting

Contact Us
Menu
  • Services
    • IT Services
    • AWS Migration
    • Cybersecurity Protection
    • Office 365 Migration
    • Network Support
    • On-Site Service
      • Delaware
      • Philadelphia
      • New Jersey
  • Support Packages
  • Testimonials
  • About Us
    • Blog
    • Our Owners

Don’t Fall for Phishing Schemes

Home » Don’t Fall for Phishing Schemes

January 7, 2019 by Vincent Caruso

Learn how to avoid phishing scams and keep your personal information safe and out of the hands of hackers.

Protect against phishing: teach your employees how to spot a fake email

Phishing scams trick recipients into sharing sensitive information with an unknown third party. Hackers are creating very clever phishing email scams. Many look sent by banks or other official institutions. Scam emails with security warnings urge immediate action. Click on a link and enter your name, password or account information. Instead of securing your account, you’ve just given the hacker what he needs to get inside the network of the company you work for and wreak havoc.

“Urgent action required”: a favorite phishing phrase

Hackers use scare tactics to stress urgency and get their victim to take immediate action. “Your inbox quotas have been exceeded. Click here to reset your account quota” is a popular tactic.

Although these email scams look official, often there are subtle clues that the email is fake.

Favorite scam phrases are:
    • “We need to verify your account information”
    • “If you don’t respond immediately, your account will be canceled”
    • “Click the link below to update your information”
How to spot a cyber attack email:
  • It’s supposedly from a business organization, but the sender has a personal email address
  • Your name isn’t used. Instead, the greeting is “Dear Sir” or “Madam”
  • The email has spelling or grammatical errors.

Think it’s a phishing email? Here’s what to do:

  • Do not click on links, download files or open attachments in emails from unknown senders. Be especially cautious of emails from unknown senders. Open attachments only when you are expecting them. You can also hover over a link without clicking on it to see where the link will actually take you. If you don’t recognize the site, don’t click.
  • Look at the browser status bar. Phishing websites often copy the entire look of a legitimate website, making it appear authentic. A secure site will have a lock icon on the browser’s status bar or a “https:” The “s” stands for “secure”.
  •  Contact your IT person. If you suspect that the email is a phishing scam, do not open it. Contact your IT person immediately.

Multiple defense strategies keep your business data and networks secure

Experts report that cybercriminals are now using “swarm attack” tactics — multiple assaults launched simultaneously in an attempt to crack into a business network. While ongoing education and constant employee reminders are very important, defending against swarm attacks needs a three-part cyber security strategy: prevention, detection, and response.

Cybersecurity detection and response technologies

When it comes to cybersecurity detection and response, Nettology can help you decide which cybersecurity tools and technologies best fit your needs and budget. Contact us today for a free consultation.

Security,  Tips & Tricks

Subscribe to our newsletter

Get the latest posts delivered right to your inbox

Schedule your free consultation today!

Talk to one of our IT consultants about your goals. We'll talk with you about how we can create a custom service plan for your business.

Contact us

Footer

Our Company

Nettology LLC
50 W Powhattan Ave
Essington, PA 19029
610-978-5160
Contact Us

Hours of Operation

Mon: Open 24 hours
Tue: Open 24 hours
Wed: Open 24 hours
Thu: Open 24 hours
Fri: Open 24 hours
Sat: Open 24 hours
Sun: Open 24 hours

Services

  • AWS Consulting
  • AWS Migration
  • Ransomware Protection
  • Office 365 Migration
  • IT Support Services
  • Network Support

Latest Articles

  • Top 10 Questions About Managed IT Services
  • What are Managed IT Services?
  • Tips for Empowering Your Remote Team
  • Why Do I Need an MSP?
  • Cloud Server Hosting Explained: How Does it Work?
  • Facebook
  • Instagram
  • LinkedIn
  • Pinterest
  • Twitter

Copyright © 2023 Nettology LLC. All rights reserved.
Privacy Policy | HTML Sitemap