centristic
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
  • Company
+1 (954) 488-2643
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
  • Company
centristic
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
  • Company
Blog
Home Data Breach How to Deal With Phishing
Data BreachEmail ScamsHIPAANEWSPhishing

How to Deal With Phishing

Roland Rodriguez October 16, 2020 0 Comments

Phishing is a popular form of cybercrime because of how effective it is. Cybercriminals have been successful using emails, text messages, or direct messages on social media to get people to respond with their personal information or click fake links. The best defense is awareness and knowing what to look for. In this article, we will discuss how to deal with phishing.

Here are some ways to recognize a phishing email:

  • Urgent call to action or threats – Be suspicious of emails that claim you must click, call, or open an attachment immediately. Often they’ll claim you have to act now to claim a reward or avoid a penalty. Creating a false sense of urgency is a common trick of phishing attacks and scams.
  • Spelling and bad grammar – Cybercriminals are not known for their grammar and spelling. Professional companies or organizations usually have an editorial staff to ensure customers get high-quality, professional content. If an email message has obvious spelling or grammatical errors, it might be a scam.
  • Suspicious links – If you suspect that an email message is a scam, do not open any links that you see. Instead, hover your mouse over, but don’t click, the link to see if the address matches the link that was typed in the message. In the following example, resting the mouse on the link reveals the real web address in the box with the yellow background. Note that the string of IP address numbers looks nothing like the company’s web address.
  • Mismatched email domains – If the email claims to be from a reputable company, like Microsoft, but the email is being sent from another email domain like Yahoo.com, or microsoftsupport.ru it’s probably a scam. Also, be watchful for very subtle misspellings of the legitimate domain name. For example, micros0ft.com where the second “o” has been replaced by a 0, or rnicrosoft.com, where the “m” has been replaced by an “r” and a “n”. These are common tricks of scammers. This is very similar to the next tip…
  • Altered web addresses –This is a form of spoofing where web addresses that closely resemble the names of well-known companies, but are slightly altered; for example, www.micorsoft.com or www.mircosoft.com. 

Cybercriminals can also get you to visit fake websites with other methods, such as text messages or phone calls. Sophisticated cybercriminals set up call centers to automatically dial or text numbers for potential targets. These messages will often include prompts. These are intended to get you to enter a PIN number or some other type of personal information.

Further Education

Click the button below to watch a short video from Microsoft. It will help better educate you on how to deal with phishing.  

Watch the Video

awareness cybercrime cybercriminals cybersecurity defense phishing phishing email
123
1005 Views
AboutRoland Rodriguez
IT security analyst with Centristic since 2014.
In Socials:
Cybersecurity Awareness MonthPrevCybersecurity Awareness MonthOctober 13, 2020
Office 365 Phishing Attack Verifies Stolen CredentialsOctober 16, 2020Office 365 Phishing Attack Verifies Stolen CredentialsNext

Related Posts

Data BreachNEWSRansomwareSecurityTips and Tricks

Cybersecurity Threat Advisory: BlackMatter Ransomware

The Cybersecurity and Infrastructure Security Agency (CISA) announced the Reduce the...

Michael Blair November 10, 2021
Data BreachNEWSPhishingRansomwareSecurityTips and Tricks

Home Office Security – Never Too Late to Evaluate

We are past the point of whether or not working remotely, or from home, is something...

Roland Rodriguez November 18, 2020
Recent Posts
  • A zero-day vulnerability was discovered in Google Chrome 
  • Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
  • Cybersecurity Threat Advisory: BlackMatter Ransomware
  • CISA Launches Campaign to Reduce the Risk of Ransomware – Centristic Launches Campaign to Eliminate the Risk
  • 9 Cybersecurity Tips to Keep Your Device and Data Safe
Categories
  • Data Breach
  • tipsEmail Scams
  • HIPAA
  • newsNEWS
  • tipsPhishing
  • phishRansomware
  • Security
  • Tips and Tricks
  • Uncategorized
Search our Site

Centristic delivers the industry’s most complete IT security and secured solutions to small cap business. Whatever your IT security needs and goals, and wherever you’re starting,

Quick Links
  • Solutions
  • Services
  • Support
  • Company
  • Blog
Get In Touch

Adress:
5645 Coral Ridge Dr #230 Coral Springs, FL 33076-3124
Phone:
+1 (954) 488-2643
Business Hours:
Monday – Friday: 9am to 6pm
Saturday – Sunday: Closed

Copyright © 2020 Centristic. All Rights Reserved