Contact us today!

FRS Pros Blog

Tip of the Week: Five Tricks to Identifying a Phishing Attempt

Tip of the Week: Five Tricks to Identifying a Phishing Attempt

Despite its whimsical name, phishing is a very serious threat to everyone, especially today’s businesses. This means that you need to be prepared to identify its warning signs and avoid risky situations. Here, we’re offering a few tips to help you do so - make sure you share them with your employees as well!

Habits to Help You Foil Phishing Attacks

Fortunately, once you and your staff have developed the following habits, the likelihood of a phishing attack fooling one of you diminishes greatly… but not entirely. Attackers are always coming up with clever and new ways to pull the wool over their targets’ eyes, and there’s always the chance that you or one of your team members could miss one of the warning signs.

This is precisely why it is so important to turn the following activities into learned, automatic behaviors.

Check Links Before You Click Them

Links are a wonderfully convenient thing, when you think about it - all you have to do to go to the website you want to visit is click on the right link. However, cybercriminals will put wrong links into their messages (often disguising them) in an attempt to take advantage of this tendency. You need to get into the habit of taking a moment before clicking through any link you see and simply hovering your cursor over it.

This will display the URL the link directs you to, giving you the chance to confirm that the link is legitimate before clicking through.

Know How to Spot Fraudulent Links 

Speaking of whether or not a link is legitimate, there are a few warning signs that hackers are counting on you to miss.

Let’s assume that you receive an email that appears to come from Amazon, offering some really impressive deals on some furnishings that your business could use, or some basic office supplies that always seem to be running low. The important thing is, it is something that definitely interests you… but is it actually coming from Amazon? As we said above, the URL can help you determine whether or not the message is legitimate.

Where in the URL does the last “dot” (as in, “dot-com”) appear? In a legitimate URL, the last dot would be the last one in the domain. 

  • [] - As the last dot is the one in “dot-com,” this link should be safe to click through.
  • [] - This URL should not be clicked on, as there is an additional dot after the domain.

Check the Sender

Who does the email actually come from? Sure, it might look like any other email from Amazon, or eBay, or PayPal, or whatever the case may be, but a skilled fraudster could have replicated their design with little trouble. What would be more difficult for them to do would be to hide the email address that displays in the header. Pay close attention, as these attackers have had to become really clever with how they disguise their trickery.

Sometimes they’ll omit letters, so the URL still looks close enough to the real one to pass the “quick glance” task. Quickly skim through this list:


Did you catch the fake? If you didn’t, look again more carefully. Since our brains are expecting certain letters to be there, we can subconsciously insert them into what we’re reading. 

Similarly, we can still read words that are scrambled up, so long as all the right letters are still there and the first and last ones are in place. In fact, that list could just have easily included the URL for “,” or some variation of another URL. Carefully checking each time you open your email will take perhaps a half-second longer, but could prevent a much more time-consuming issue.

Taking the few moments to go through these steps won’t interrupt your day unduly, but will help keep your business safe. For more assistance with your security and assorted other IT tips, keep checking back in with this blog, and reach out to FRS Pros at 561-795-2000.

Expansion of Remote Work
Are You On the Lookout for Payment Card Skimmers?

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Network Security Productivity Business Computing Privacy Internet Hackers User Tips Google Software Microsoft Cloud Business Management Computer Innovation Hardware Tech Term Data Data Backup Efficiency Smartphones Mobile Devices Malware Cybersecurity Email Hosted Solutions Windows 10 Data Recovery IT Services Browser Outsourced IT Smartphone Office 365 Communication IT Support Android Backup Upgrade Business Internet of Things Gadgets Windows Phishing Apps VoIP Workplace Tips Small Business Data Security Disaster Recovery Communications Cybercrime Business Continuity Operating System Managed IT Services Ransomware Mobile Device Management Cloud Computing Facebook Users Saving Money Network OneNote Money Artificial Intelligence Server Alert Law Enforcement Social Media Managed Service Information Vulnerability Employer-Employee Relationship Virtualization Managed IT Services Passwords IT Support Miscellaneous Best Practice Spam Automation Health Blockchain Applications Collaboration Two-factor Authentication Wireless Chrome Microsoft Office Computers Mobile Device Holiday Networking Managed Service Provider Word Information Technology Managed IT Telephone Systems BYOD Unsupported Software Augmented Reality Tech Support Patch Management App Password Bring Your Own Device Router Hacking Gmail Google Drive Settings Windows 10 Data Storage Save Money Evernote Windows 7 User Error Risk Management Audit Budget Business Technology Going Green Social Data Protection Wireless Technology Cortana Meetings Data Management Hard Drive Display Data Loss Government Wi-Fi Conferencing Robot IT Management Productivity Update Cost Management Sports Politics Google Docs Project Management Payment Cards Shortcut Wireless Charging Devices The Internet of Things WannaCry Commerce VPN iPhone Access Control Telephony BDR Printing Data Breach Mobile Security History Travel Proactive IT SaaS Vendor Quick Tips Google Assistant File Sharing Application Excel Fraud Hybrid Cloud Encryption Hosted Solution Touchscreen Search Safety Avoiding Downtime Mobility WiFi Transportation Windows 10s HBO Files Value Wasting Time Storage Social Engineering Laptop DDoS Micrsosoft Medical IT Battery Sync Screen Mirroring Disaster Data Privacy Managed IT Service Edge Computer Care Nanotechnology Recovery Investment Amazon Downtime Instant Messaging Hacker FAQ Private Cloud NFL eWaste Sabotage Gamification Keyboard Shortcuts Emergency Retail Websites Unified Threat Management Myths Solid State Drive Accessory Identities Touchpad Business Intelligence Software as a Service 5G Point of Sale Emails Cast Managed Services Provider Entertainment Ciminal Root Cause Analysis Administrator ROI Virtual Assistant E-Commerce Charger Identity Theft Device Security Computer Fan Streaming Media PC Memory Human Resources Data Theft Upgrades Lithium-ion battery Threats Testing Adobe Workers Hard Disk Drive Computer Forensics Peripheral Legislation Language Humor Digital Signage Bandwidth YouTube Office Marketing Chromebook Facebook Privacy Co-Managed Services Access Windows Server 2008 R2 Alexa for Business Scams Camera Vendor Management Windows Ink Chromecast Paperless Office Financial Payroll Gifts Computing Personal Information Licensing Updates IT Solutions Management Comparison Firewall Employees Scam Reputation Webinar Telephone Microsoft Excel IT budget Internet Exlporer Mobile Office Employee Education Outlook Virtual Private Network Projects Samsung Google Maps Spyware Data storage Smartwatch Security Cameras Credit Cards App store Consultant Microsoft Word Remote Computing PowerPoint Admin Specifications Virus Remote Monitoring Uninterrupted Power Supply Processor OneDrive IT solutions Hyperlink Legal Development Break/Fix Identity Remote Workers Antivirus Apple Server Maintenance Machine Learning Tablets Maintenance iOS WIndows Server 2008 Wireless Internet Saving Time Sales Proactive Benchmarks Employee-Employer Relationship Voice over Internet Protocol Flexibility Music Office tips Regulation Smart Technology Advertising Twitter Scalability Analytics Keyboard End of Support Black Market Cleaning HaaS Relocation Big Data Thank You Automobile Managing Stress USB Worker How To Books Congratulations Cache Video Games Experience PDF Hiring/Firing Work/Life Balance Training Monitors Virtual Reality Mobile Computing Current Events Electronic Medical Records Crowdsourcing Employer Employee Relationship Phone System Text Messaging Television CrashOverride Compliance Benefits es Printers Company Culture Save Time Computer Accessories