Contact us today!

FRS Pros Blog

Tip of the Week: 5 Ways to Easily Identify a Phishing Attack

Tip of the Week: 5 Ways to Easily Identify a Phishing Attack

If you’ve been reading this blog for any length of time, you’ve seen us reference a phishing attack. Whether you are being asked by some supposed Nigerian prince to fork over money or you are getting an email by what seems to be your bank that directs you to download an attachment, you are probably a potential victim of a phishing scam. The difference between being a potential victim and a victim is knowing how to identify it. Today, we’ll give you five ways to identify a phishing message so that you—or your company—won’t be scammed.

#1 - Urgency

When you get an email and the verbiage is such that it immediately makes you panic a little, you are probably dealing with a phishing attempt. Email is a really useful tool for businesses and individuals alike, but it typically isn’t the medium where someone is going to give you news that will make your anxiety spike. The message can come from many different directions, but if its tone is one where it makes you think you have to act immediately, you should calm down and verify the message with a call or text. 

#2 - Attachments

Again, email is useful for interpersonal communication, but unless you are expecting an email, or you know exactly who is sending you a message, you should never click on an attachment. This goes double if it is from a financial institution. No reputable bank is going to send you a downloadable attachment unless you are in direct communication with them. Even then, these organizations have secure apps for these types of transactions. Do yourself a favor and don’t download attachments from emails unless you know exactly what the attachment is.

#3 - Spelling and Grammar Errors

Let me ask you this: In the course of doing business, when corresponding with people outside your organization, do you send emails with gratuitous spelling and error problems? No? That’s because you don’t want the recipient to be put off by your handle of the language. Phishing emails tend to be written by people whose first language isn’t English and they tend to make terrible spelling and grammar mistakes. If you are getting an email from your bank, but the content of the message is riddled with typos, you are dealing with a phishing email.

#4 - Your Personal Information

Any email that is sent to you that asks for personal information should be met with caution. Even if it looks authentic, when the email directs you to provide information that you don’t feel comfortable giving out—like a credit card number or your social security number—you’re almost always dealing with a scammer. If an organization needs your personal information, it will create an interface that will allow you to securely provide that information. They can’t afford not to.

#5 - Addresses Aren’t Legitimate

Finally, one of the telltale signs that you are being phished is the legitimacy of the links and addresses in the message itself. Firstly, you should be suspect of links in unsolicited emails anyway, but to be sure, you can mouse-over any links. If you don’t immediately recognize the web address, don’t click on the link. As far as email addresses go, it can often be difficult to tell if an email address is legitimate or not. One rule of thumb, if there is more than one period in the address, don’t click on it. It may be legitimate, but investigating it takes seconds and can help you avoid a lot of headaches. 

Here’s a quick, short guide to help you and your staff:

  1. Everyone handles their domains a little differently, but use this as a general rule of thumb:
    • a. - Safe
    • b. - Safe
    • c. - Safe
    • d. - Safe
    • e. - Suspicious! (notice the dot immediately after Paypal’s domain name)
    • f. - Suspicious!
  2. - Suspicious! Don’t trust dots after the domain!
  3. Check the email in the header. An email from Amazon wouldn’t come in as Do a quick Google search for the email address to see if it is legitimate.
  4. Always be careful opening attachments. If there is an attachment or link on the email, be extra cautious.
  5. Be skeptical of password alerts. If the email mentions passwords, such as “your password has been stolen,” be suspicious. 

We hope that this short guide helps you avoid clicking on phishing attacks as they can have devastating and adverse effects on your computer, your network, and your business. For more great tips and tricks, return to our blog regularly. If you want to talk about how best to train your staff about phishing attacks, call us today at 561-795-2000.

VoIP Can Be a Game Changer
Businesses Need Data Backup to Manage Risk

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Privacy Hackers Internet Software User Tips Google Cloud Innovation Hardware Efficiency Microsoft Data Email Business Management Hosted Solutions Business Communication Computer Windows 10 Cybersecurity Smartphones Data Backup IT Support Malware Mobile Devices Tech Term Small Business IT Services Workplace Tips Android Backup Data Recovery Browser Collaboration VoIP Disaster Recovery Smartphone Users Office 365 Upgrade Outsourced IT Communications Phishing Gadgets Windows Information Internet of Things Covid-19 Cloud Computing Apps Cybercrime Business Continuity Data Security Network Miscellaneous Ransomware Saving Money Operating System Passwords Managed IT Services Automation Quick Tips Wireless Managed Service Mobile Device Management Microsoft Office Social Media Facebook Health Blockchain Two-factor Authentication Vulnerability Money Artificial Intelligence Alert Information Technology Mobile Device OneNote Server Law Enforcement Conferencing Employer-Employee Relationship Applications Chrome Spam Mobile Office Holiday Virtualization Managed IT Services Networking IT Support Best Practice Managed IT Unsupported Software Augmented Reality BYOD Google Drive Settings Access Control App Hacking Printing Windows 10 Gmail Save Money Bring Your Own Device Computers HIPAA Battery Data Storage Retail WiFi Wi-Fi Windows 7 Word Telephone Systems Patch Management Tech Support Project Management Managed Service Provider BDR Password Data Breach Router Bandwidth Payment Cards Marketing WannaCry Travel Hosted Solution Commerce Paperless Office Excel Avoiding Downtime Mobility Management File Sharing Application Search Apple Fraud Encryption Mobile Security Training Safety Proactive IT Evernote SaaS Remote Vendor Google Assistant User Error Going Green Social Risk Management Budget Government Hybrid Cloud Touchscreen Wireless Technology Remote Workers Cortana Voice over Internet Protocol Data Management Data Loss Robot Audit Productivity Update The Internet of Things Business Technology Sports Wireless Charging Politics Meetings Google Docs VPN Shortcut iPhone Software as a Service Data Protection Hard Drive Display Devices History Human Resources Telephony Cost Management YouTube IT Management Credit Cards App store Samsung Chromebook Co-Managed Services Digital Signage Printer Google Maps Spyware Alexa for Business Inventory Camera Windows Server 2008 R2 Microsoft Word Financial Payroll Facebook Privacy Uninterrupted Power Supply Specifications Virus IT Solutions AI Legal Scams Organization Employees Antivirus Laptop Telephone Firewall PCI DSS Transportation Employee Webinar Projects Workstation Tablets Maintenance Private Cloud Security Cameras Consultant eCommerce Sales Proactive Smartwatch Files Sync PowerPoint Admin Remote Monitoring Virtual Private Network DDoS Storage Social Engineering OneDrive FAQ Touchpad Hyperlink Processor Recovery Regulations Compliance Edge Instant Messaging Hacker Compliance Break/Fix IT solutions Hosted Desktop Disaster Identity Printers Development Telework NFL eWaste Emergency Machine Learning Fiber Optics Websites iOS WIndows Server 2008 Server Maintenance Remote Work Wireless Internet Saving Time Innovations Identities Point of Sale Employee-Employer Relationship Smart Devices Charger Entertainment Humor Value Wasting Time Benchmarks Policy Administrator Ciminal Keyboard Medical IT Windows 10s HBO Identity Theft Data Privacy Computer Care Nanotechnology Micrsosoft Audits Streaming Media Device Security Amazon Downtime Screen Mirroring Lithium-ion battery Holidays Data Theft Investment Net Neutrality Adobe Workers Personal Information Gamification Keyboard Shortcuts Unified Threat Management Managed IT Service Remote Working Legislation Language Office Sabotage Troubleshooting Accessory Myths Procedure Access 5G Solid State Drive Vendor Management Root Cause Analysis Business Intelligence Solutions Chromecast Windows Ink Reputation Virtual Assistant E-Commerce Emails Cast Copiers Gifts Computing Testing Computer Fan ROI Internet Service Provider Licensing Updates Memory Upgrades Managed Services Provider Comparison Data storage Scam PC CRM Outlook Computer Forensics Peripheral Threats Internet Exlporer Video Conferencing Microsoft Excel IT budget Education Remote Computing Hard Disk Drive Work/Life Balance Text Messaging Virtual Reality Current Events Electronic Medical Records Crowdsourcing Employer Employee Relationship es Phone System Cache Benefits Office tips Save Time Communitications Advertising Monitors Computer Accessories Flexibility Music Smart Technology Television CrashOverride Company Culture Scalability Analytics HaaS End of Support Relocation Regulation Black Market Cleaning Big Data Thank You Automobile Twitter Managing Stress PDF USB Worker How To Books Mobile Computing Congratulations Video Games Experience Hiring/Firing