Skip to main content

Is That Email a Phishing Scheme?

 
 
Research has revealed that over half of all users end up opening fraudulent emails and often even fall for them. Phishing is done with the aim of gathering personal information about you, generally related to your finances. The most common reason for the large number of people falling for fraudulent emails is that the phishing attempts are often so well-disguised that they escape the eyes of a busy email reader. Here are a few tips that help you identify whether that email really came from your bank or is another attempt at defrauding you…
 
1. They are asking for personal information - Remember, no bank or financial institution asks you to share your key personal information via email, or even phone. So, if you get an email where they ask for your ATM PIN or your e-banking password, something’s a miss.

2. The links seem to be fake - Phishing emails always contain links that you are asked to click on. You should verify if the links are genuine. Here are a few things to look for when doing that:

  • Spelling - Check for the misspellings in the URL. For example, if your bank’s web address is www.bankofamerica.com, a phishing scheme email could misspell it as www.bankofamarica.com or www.bankofamerica-verification.com
  • Disguised URLs - Sometimes, URLs can be disguised…meaning, while they look genuine, they ultimately redirect you to some fraudulent site. You can recognize the actual URL upon a mouseover, or by right clicking on the URL, and selecting the ‘copy hyperlink’ option and pasting the hyperlink on a notepad file. But, NEVER ever, paste the hyperlink directly into your web browser.
  • URLs with ‘@’ signs - If you find a URL that has an ‘@’ sign, steer clear of it even if it seems genuine. Browsers ignore URL information that precedes @ sign. That means, the URL www.bankofamerica.com@mysite.net will take you to mysite.net and not to any Bank of America page.
3. Other tell-tale signs - Apart from identifying fake URLs, there are other tell-tale signs that help you identify fraudulent emails. Some of these include:
  • Emails where the main message is in the form of an image, which, upon opening, takes you to the malicious URL.
  • Another sign is an attachment. Never open attachments from unknown sources as they may contain viruses that can harm your computer and network.
  • The message seems to urge you to do something immediately. Scammers often induce a sense of urgency in their emails and threaten you with consequences if you don’t respond. For example, threat of bank account closure if you don’t verify your ATM PIN or e-banking password.
Finally, get a good anti virus/email protection program installed. It can help you by automatically directing spam and junk mail into spam folders and deactivating malicious attachments.



Comments

Popular posts from this blog

Four ways unified communications can improve productivity Part II

Four ways unified communications can improve productivity Part II In our last blog we suggested that unified communications has value to an organization's efforts to increase productivity. It can facilitate smoother, more efficient collaboration in a 24/7 workspace. Unified communications can Improve the functionality of our 24/7 workplace - The reality of 24/7 availability has been around for a while, and learning to place constraints on that is for another e-guide. However, unified communications can play a role on the 24/7 expectation problem. For one thing, with a single portal to an individual’s multiple communication channels, an employee can more easily communicate across those channels that they are not available and therefore limit expectations for an immediate or timely response when that is not possible. Also, with a unified portal, responding to different channels in off times can be easier and therefore less time-intrusive. Improve client satisfaction - Nothin...

Five Ways Your Business Can Improve Its Search Engine Rankings

  In an age where most business happens online, not showing up in Google search results can really hurt you. While there’s no real shortcut to showing up consistently on web searches, there are a few quick fixes to get your site to show up on your potential customer’s search results...   1. HTML tags -  Important HTML tags include the title tag, meta description and meta keywords. Make sure each page of your website has appropriate HTML tags. The title tag of each page should be unique and relevant to that particular page.   2. Alternative text images -  Ensure that most of the images on your website have alternative text tags. Alt tags are basically descriptions for images. By adding relevant alternative tags to images, you are allowing search engines to recognize them, which will improve the likelihood of your page showing up in search results.   3. File hierarchy -  How simple is your HTML file hierarchy? Check to see if your website’s pages are logically situated and avoid too many...

Is your Business Safe from Virtual Threats?

    Did you know that 50% of small business owners think their businesses are too small to be targeted by the thieves of the virtual world? Contrary to popular belief, 72% of hacker attacks often happen to smaller firms - firms with less than 100 employees! So how prepared is your SMB? Here’s a checklist to help you find out how vulnerable you are to these attacks.   1. Do you have Antivirus protection? -  An antivirus software program can protect you from threats that originate from emails such as phishing and virus attacks. However, the most striking fact is that 61% of small businesses don’t install any antivirus software! If you are one of them, then it’s time to change!   2. How sturdy is your Firewall? -  A good firewall system protects your computers from the variety of threats that exist in the virtual world. Examples include harmful cookies, viruses, worms and other such malicious programs used by hackers.   3. Do you use a Spam filter? -  Using a simple spam filter for your e...