Contact us today!

FRS Pros Blog

Tip of the Week: Five Tricks to Identifying a Phishing Attempt

Tip of the Week: Five Tricks to Identifying a Phishing Attempt

Despite its whimsical name, phishing is a very serious threat to everyone, especially today’s businesses. This means that you need to be prepared to identify its warning signs and avoid risky situations. Here, we’re offering a few tips to help you do so - make sure you share them with your employees as well!

Habits to Help You Foil Phishing Attacks

Fortunately, once you and your staff have developed the following habits, the likelihood of a phishing attack fooling one of you diminishes greatly… but not entirely. Attackers are always coming up with clever and new ways to pull the wool over their targets’ eyes, and there’s always the chance that you or one of your team members could miss one of the warning signs.

This is precisely why it is so important to turn the following activities into learned, automatic behaviors.

Check Links Before You Click Them

Links are a wonderfully convenient thing, when you think about it - all you have to do to go to the website you want to visit is click on the right link. However, cybercriminals will put wrong links into their messages (often disguising them) in an attempt to take advantage of this tendency. You need to get into the habit of taking a moment before clicking through any link you see and simply hovering your cursor over it.

This will display the URL the link directs you to, giving you the chance to confirm that the link is legitimate before clicking through.

Know How to Spot Fraudulent Links 

Speaking of whether or not a link is legitimate, there are a few warning signs that hackers are counting on you to miss.

Let’s assume that you receive an email that appears to come from Amazon, offering some really impressive deals on some furnishings that your business could use, or some basic office supplies that always seem to be running low. The important thing is, it is something that definitely interests you… but is it actually coming from Amazon? As we said above, the URL can help you determine whether or not the message is legitimate.

Where in the URL does the last “dot” (as in, “dot-com”) appear? In a legitimate URL, the last dot would be the last one in the domain. 

  • [] - As the last dot is the one in “dot-com,” this link should be safe to click through.
  • [] - This URL should not be clicked on, as there is an additional dot after the domain.

Check the Sender

Who does the email actually come from? Sure, it might look like any other email from Amazon, or eBay, or PayPal, or whatever the case may be, but a skilled fraudster could have replicated their design with little trouble. What would be more difficult for them to do would be to hide the email address that displays in the header. Pay close attention, as these attackers have had to become really clever with how they disguise their trickery.

Sometimes they’ll omit letters, so the URL still looks close enough to the real one to pass the “quick glance” task. Quickly skim through this list:


Did you catch the fake? If you didn’t, look again more carefully. Since our brains are expecting certain letters to be there, we can subconsciously insert them into what we’re reading. 

Similarly, we can still read words that are scrambled up, so long as all the right letters are still there and the first and last ones are in place. In fact, that list could just have easily included the URL for “,” or some variation of another URL. Carefully checking each time you open your email will take perhaps a half-second longer, but could prevent a much more time-consuming issue.

Taking the few moments to go through these steps won’t interrupt your day unduly, but will help keep your business safe. For more assistance with your security and assorted other IT tips, keep checking back in with this blog, and reach out to FRS Pros at 561-795-2000.

Expansion of Remote Work
Are You On the Lookout for Payment Card Skimmers?

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Network Security Business Computing Privacy Internet User Tips Software Hackers Cloud Microsoft Google Hardware Efficiency Innovation Business Management Data Computer Communication Email Hosted Solutions Windows 10 Smartphones Tech Term IT Services Cybersecurity Data Backup IT Support Malware Mobile Devices Business Backup Office 365 Data Recovery Browser Upgrade Disaster Recovery Workplace Tips Android Smartphone Small Business Outsourced IT VoIP Internet of Things Gadgets Windows Apps Users Communications Cloud Computing Business Continuity Data Security Collaboration Phishing Saving Money Network Ransomware Managed IT Services Automation Cybercrime Information Microsoft Office Operating System Miscellaneous Facebook Managed Service Mobile Device Management Vulnerability Money Artificial Intelligence OneNote Alert Server Passwords Law Enforcement Social Media Health Employer-Employee Relationship Blockchain Two-factor Authentication Mobile Office Holiday Virtualization Managed IT Services Networking IT Support Managed IT Best Practice Quick Tips Applications Wireless Spam Chrome Windows 10 Gmail Bring Your Own Device Save Money Computers Data Storage Retail Mobile Device Information Technology Windows 7 Word Conferencing Patch Management Telephone Systems Project Management Tech Support Managed Service Provider Data Breach Bandwidth Unsupported Software Augmented Reality Password BYOD Router Access Control App Google Drive Settings Hacking Printing Mobile Security Safety Proactive IT Evernote SaaS Vendor Google Assistant User Error Going Green Social Hybrid Cloud Touchscreen Risk Management Government WiFi Remote Workers Cortana Budget Voice over Internet Protocol Data Loss Wireless Technology Robot Data Management Wi-Fi Audit Update Business Technology Wireless Charging Politics Meetings The Internet of Things Google Docs Shortcut Productivity Software as a Service Data Protection Hard Drive Display VPN iPhone Devices Sports Human Resources BDR History Telephony Cost Management IT Management Payment Cards Marketing WannaCry Travel Commerce Paperless Office Hosted Solution Excel File Sharing Application Search Fraud Encryption Avoiding Downtime Mobility Projects Transportation Tablets Maintenance Security Cameras Consultant Laptop eCommerce Sales Proactive Smartwatch Private Cloud HIPAA Sync PowerPoint Admin Remote Monitoring Virtual Private Network Storage Social Engineering Battery OneDrive FAQ DDoS Hyperlink Processor Edge Instant Messaging Hacker Files Break/Fix IT solutions Hosted Desktop Recovery Identity Printers Development NFL eWaste Emergency Disaster Machine Learning Touchpad Fiber Optics Websites iOS WIndows Server 2008 Server Maintenance Remote Work Wireless Internet Saving Time Identities Point of Sale Employee-Employer Relationship Charger Entertainment Value Wasting Time Benchmarks Ciminal Keyboard Medical IT Windows 10s HBO Smart Devices Identity Theft Data Privacy Administrator Computer Care Nanotechnology Micrsosoft Device Security Amazon Downtime Screen Mirroring Humor Holidays Data Theft Investment Net Neutrality Adobe Workers Lithium-ion battery Gamification Keyboard Shortcuts Unified Threat Management Managed IT Service Legislation Language Office Streaming Media Personal Information Accessory Myths 5G Solid State Drive Sabotage Troubleshooting Vendor Management Access Root Cause Analysis Business Intelligence Windows Ink Virtual Assistant E-Commerce Emails Cast Copiers Gifts Computing Computer Fan ROI Reputation Internet Service Provider Licensing Updates Memory Upgrades Managed Services Provider Comparison Scam Chromecast Testing PC CRM Outlook Computer Forensics Peripheral Data storage Threats Microsoft Excel IT budget Education YouTube Hard Disk Drive Samsung Internet Exlporer Chromebook Co-Managed Services Remote Computing Digital Signage Google Maps Spyware Alexa for Business Inventory Credit Cards App store Camera Windows Server 2008 R2 Microsoft Word Financial Payroll Facebook Privacy Specifications Virus AI Legal Uninterrupted Power Supply Management Scams Employees IT Solutions Antivirus Telephone Firewall Apple Employee Webinar Training Monitors Office tips Computer Accessories Flexibility Music Advertising Smart Technology Television CrashOverride Compliance Company Culture Scalability Analytics End of Support Regulation HaaS Relocation Black Market Cleaning Big Data Automobile Thank You Twitter Managing Stress USB Worker How To Books PDF Mobile Computing Video Games Experience Congratulations Hiring/Firing Work/Life Balance Virtual Reality Covid-19 Current Events Electronic Medical Records Text Messaging Crowdsourcing Employer Employee Relationship es Phone System Cache Benefits Save Time Communitications