• Skip to main content
  • Skip to footer

610-978-5160

  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
Nettology logo

Nettology

IT Experts in Philadelphia. AWS Cisco Vmware Consulting

Contact Us
Menu
  • Services
    • IT Services
    • AWS Migration
    • Cybersecurity Protection
    • Office 365 Migration
    • Network Support
    • On-Site Service
      • Delaware
      • Philadelphia
      • New Jersey
  • Support Packages
  • Testimonials
  • About Us
    • Blog
    • Our Owners

Is That Email a Phishing Scheme?

Home » Is That Email a Phishing Scheme?

February 17, 2021 by Vincent Caruso

Research has revealed that over half of all users end up opening fraudulent emails and often even fall for them. Phishing is done with the aim of gathering personal information about you, generally related to your finances. The most common reason for the large number of people falling for fraudulent emails is that the phishing attempts are often so well-disguised that they escape the eyes of a busy email reader. Here are a few tips that help you identify whether that email really came from your bank or is another attempt at defrauding you…

1. They are asking for personal information – Remember, no bank or financial institution asks you to share your key personal information via email, or even phone. So, if you get an email where they ask for your ATM PIN or your e-banking password, something’s a miss.

2. The links seem to be fake – Phishing emails always contain links that you are asked to click on. You should verify if the links are genuine. Here are a few things to look for when doing that:

  • Spelling – Check for the misspellings in the URL. For example, if your bank’s web address is www.bankofamerica.com, a phishing scheme email could misspell it as www.bankofamarica.com or www.bankofamerica-verification.com
  • Disguised URLs – Sometimes, URLs can be disguised…meaning, while they look genuine, they ultimately redirect you to some fraudulent site. You can recognize the actual URL upon a mouseover, or by right clicking on the URL, and selecting the ‘copy hyperlink’ option and pasting the hyperlink on a notepad file. But, NEVER ever, paste the hyperlink directly into your web browser.
  • URLs with ‘@’ signs – If you find a URL that has an ‘@’ sign, steer clear of it even if it seems genuine. Browsers ignore URL information that precedes @ sign. That means, the URL www.bankofamerica.com@mysite.net will take you to mysite.net and not to any Bank of America page.

3. Other tell-tale signs – Apart from identifying fake URLs, there are other tell-tale signs that help you identify fraudulent emails. Some of these include:

  • Emails where the main message is in the form of an image, which, upon opening, takes you to the malicious URL.
  • Another sign is an attachment. Never open attachments from unknown sources as they may contain viruses that can harm your computer and network.
  • The message seems to urge you to do something immediately. Scammers often induce a sense of urgency in their emails and threaten you with consequences if you don’t respond. For example, threat of bank account closure if you don’t verify your ATM PIN or e-banking password.
Finally, get a good anti virus/email protection program installed. It can help you by automatically directing spam and junk mail into spam folders and deactivating malicious attachments.

Tips & Tricks

Subscribe to our newsletter

Get the latest posts delivered right to your inbox

Schedule your free consultation today!

Talk to one of our IT consultants about your goals. We'll talk with you about how we can create a custom service plan for your business.

Contact us

Footer

Our Company

Nettology LLC
50 W Powhattan Ave
Essington, PA 19029
610-978-5160
Contact Us

Hours of Operation

Mon: Open 24 hours
Tue: Open 24 hours
Wed: Open 24 hours
Thu: Open 24 hours
Fri: Open 24 hours
Sat: Open 24 hours
Sun: Open 24 hours

Services

  • AWS Consulting
  • AWS Migration
  • Ransomware Protection
  • Office 365 Migration
  • IT Support Services
  • Network Support

Latest Articles

  • Top 10 Questions About Managed IT Services
  • What are Managed IT Services?
  • Tips for Empowering Your Remote Team
  • Why Do I Need an MSP?
  • Cloud Server Hosting Explained: How Does it Work?
  • Facebook
  • Instagram
  • LinkedIn
  • Pinterest
  • Twitter

Copyright © 2023 Nettology LLC. All rights reserved.
Privacy Policy | HTML Sitemap