Skip to main content

Is That Email a Phishing Scheme?

 
 
Research has revealed that over half of all users end up opening fraudulent emails and often even fall for them. Phishing is done with the aim of gathering personal information about you, generally related to your finances. The most common reason for the large number of people falling for fraudulent emails is that the phishing attempts are often so well-disguised that they escape the eyes of a busy email reader. Here are a few tips that help you identify whether that email really came from your bank or is another attempt at defrauding you…
 
1. They are asking for personal information - Remember, no bank or financial institution asks you to share your key personal information via email, or even phone. So, if you get an email where they ask for your ATM PIN or your e-banking password, something’s a miss.

2. The links seem to be fake - Phishing emails always contain links that you are asked to click on. You should verify if the links are genuine. Here are a few things to look for when doing that:

  • Spelling - Check for the misspellings in the URL. For example, if your bank’s web address is www.bankofamerica.com, a phishing scheme email could misspell it as www.bankofamarica.com or www.bankofamerica-verification.com
  • Disguised URLs - Sometimes, URLs can be disguised…meaning, while they look genuine, they ultimately redirect you to some fraudulent site. You can recognize the actual URL upon a mouseover, or by right clicking on the URL, and selecting the ‘copy hyperlink’ option and pasting the hyperlink on a notepad file. But, NEVER ever, paste the hyperlink directly into your web browser.
  • URLs with ‘@’ signs - If you find a URL that has an ‘@’ sign, steer clear of it even if it seems genuine. Browsers ignore URL information that precedes @ sign. That means, the URL www.bankofamerica.com@mysite.net will take you to mysite.net and not to any Bank of America page.
3. Other tell-tale signs - Apart from identifying fake URLs, there are other tell-tale signs that help you identify fraudulent emails. Some of these include:
  • Emails where the main message is in the form of an image, which, upon opening, takes you to the malicious URL.
  • Another sign is an attachment. Never open attachments from unknown sources as they may contain viruses that can harm your computer and network.
  • The message seems to urge you to do something immediately. Scammers often induce a sense of urgency in their emails and threaten you with consequences if you don’t respond. For example, threat of bank account closure if you don’t verify your ATM PIN or e-banking password.
Finally, get a good anti virus/email protection program installed. It can help you by automatically directing spam and junk mail into spam folders and deactivating malicious attachments.



Comments

Popular posts from this blog

Is your Business Safe from Virtual Threats?

    Did you know that 50% of small business owners think their businesses are too small to be targeted by the thieves of the virtual world? Contrary to popular belief, 72% of hacker attacks often happen to smaller firms - firms with less than 100 employees! So how prepared is your SMB? Here’s a checklist to help you find out how vulnerable you are to these attacks.   1. Do you have Antivirus protection? -  An antivirus software program can protect you from threats that originate from emails such as phishing and virus attacks. However, the most striking fact is that 61% of small businesses don’t install any antivirus software! If you are one of them, then it’s time to change!   2. How sturdy is your Firewall? -  A good firewall system protects your computers from the variety of threats that exist in the virtual world. Examples include harmful cookies, viruses, worms and other such malicious programs used by hackers.   3. Do you use a Spam filter? -  Using a simple spam filter for your e

Four ways unified communications can improve productivity Part II

Four ways unified communications can improve productivity Part II In our last blog we suggested that unified communications has value to an organization's efforts to increase productivity. It can facilitate smoother, more efficient collaboration in a 24/7 workspace. Unified communications can Improve the functionality of our 24/7 workplace - The reality of 24/7 availability has been around for a while, and learning to place constraints on that is for another e-guide. However, unified communications can play a role on the 24/7 expectation problem. For one thing, with a single portal to an individual’s multiple communication channels, an employee can more easily communicate across those channels that they are not available and therefore limit expectations for an immediate or timely response when that is not possible. Also, with a unified portal, responding to different channels in off times can be easier and therefore less time-intrusive. Improve client satisfaction - Nothin

Hosted PBX - Is it right for you?

Cloud communications is a hot topic and everyone's doing it.  Is it right for you? It might be.  It's not perfect for every business, but for most it is a great fit.   Cloud PBX, or Unified Communications as a Service (UCaaS) is a cost effective way of delivering advanced communication features to small and medium businesses.   Integration with Outlook and your CRM, instant messaging, video calling, desktop and document sharing, mobile access, call recording, even call centre functionality are all available to anyone.  These features used to only be available to companies with the money to shell out for an on-premise UC system - but not anymore. Why hosted? You are likely already hosting some or all of your data and applications in the cloud.  Many at least are using Office 365.  This is another opportunity to eliminate the capital and maintenance costs of hardware and software running in your office, as well as reduce ongoing costs for analog or PRI connections.  Y