Creative Computer Solutions, Inc
Now Hiring: Are you a driven and motivated 1st Line IT Support Engineer?
  • About
    • Our Story
    • Now Hiring
    • Community
  • Services
    • Managed Services
    • Managed Firewall Services
    • Data Backup Services
    • Cloud Services
    • Email Services
    • Business Relocation Services
    • Security Services
    • VOIP Services
  • Resources
    • Training
    • Live Cyber Threat Attack Map
    • SANS
    • Small Business Development
    • Request Support
    • Videos
    • Recycling
  • Blog
  • Contact Us
  • Remote Support
    • Connect to My PC
    • Join with Code
icon
Have any questions?
(360) 944 - 5111
Creative Computer Solutions, Inc
  • About
    • Our Story
    • Now Hiring
    • Community
  • Services
    • Managed Services
    • Managed Firewall Services
    • Data Backup Services
    • Cloud Services
    • Email Services
    • Business Relocation Services
    • Security Services
    • VOIP Services
  • Resources
    • Training
    • Live Cyber Threat Attack Map
    • SANS
    • Small Business Development
    • Request Support
    • Videos
    • Recycling
  • Blog
  • Contact Us
  • Remote Support
    • Connect to My PC
    • Join with Code
icon
Have any questions?
(360) 944 - 5111

Gone Phishing – How to Identify a Phishing Scam

Network Security Uncategorized

Gone Phishing – How to Identify a Phishing Scam

by Scott June 19, 2015

Identify a phishing scamPhishing is a type of cyber-attack/scam where an attempt to obtain personal information is made by posing as a legitimate company, typically via email, to gain your trust. Companies such as AOL, Sony, and Target have all fallen victim to phishing scams. Cyber scams are constantly evolving, so how do you identify a phishing scam?

How to Identify a Phishing Scam – 5 Ways

While some phishing scams can be quite obvious and rather hilarious, don’t be caught off guard. Here are some tips you and your employees can use to help identify a phishing scam:

  • The email address or links don’t match the domain name of the company’s legitimate website. – For example, accountservices@citibanking.com might be posing as accountservices@citibank.com .
  • Grammar, typos, misspellings and unprofessionalism. – This is probably the most common way people can easily identify a phishing scam.
  • “Dear Customer…” – Lack of personalization. If they aren’t providing you with the last four of your account, your first and last name, or some piece of information related to your account, it’s likely phishing.
  • Urgent call-to-action. – Scammers purposefully create a sense of urgency so that you act before you think. Don’t fall for it; if something is that urgent, you’ll receive a phone call from your banking institution or company.
  • Unexpected attachments or package tracking links. – If you aren’t expecting it, don’t click on it or open it. If you’re unsure, ask your supervisor or IT department.

Oops… I clicked on it.

It’s not always easy to identify a phishing scam. Scammers have gotten pretty good at casting legitimate-looking bait that looks pretty convincing. You might have been taken off-guard one day and accidentally clicked on a phishing link, or accidentally provided your account information. If this happens, you must act quickly by doing the following:

  • Log into your accounts and change your passwords. Always access your accounts by typing the website into the browser. Avoid clicking on account login links sent to you via email.
  • Notify banking institutions of the possible breach so they can monitor your accounts.
  • Consider obtaining third-party identity theft protection, which is a good idea to have anyway.

For more information on phishing and network security, contact us at CCSI. We can review your company’s current network security setup to make sure you’re up-to-date and protected.

Tags:account protection cyber attacks email security internet security network security phishing phishing scam

Recent Posts

  • 6 Ways IT Support for Manufacturing is Crucial
  • Revolutionizing Businesses: Innovative IT Solutions for Success
  • 6 Reasons Why Computer Networking Services are Indispensable
  • 4 Ways to Convert Documents to PDF Without Adobe
  • 2023 Ultimate Guide to VoIP Services: Revolutionizing Communication

Categories

  • Backup – Recovery
  • Cloud Computing
  • Computer Hardware
  • Email
  • home
  • Internet
  • Managed Services
  • Network Design
  • Network Monitoring
  • Network Security
  • News & Events
  • office productivity
  • Quick Tips
  • Server Management
  • Software Licensing
  • Uncategorized
  • VoIP Phone System

Tags

backup business IT support Business Network Security cloud computing Cryptolocker data breach data recovery data security egnyte hybrid cloud Email employee smartphone Facebook firewall information technology internet security IT Managed Services malware managed services Managed Services mobile device security Mobile Security network monitoring network protection network security network security tips Office office productivity password PC phishing privacy productivity ransomware remote server monitoring security Social Media Technology trojan troubleshooting Twitter virus viruses vulnerability scanning windows Windows 10
  • Previous Post Pac-Man Turns 35 - May 2015
  • Next Post Strategic Purchasing Plan – Getting the Most from Your Technology Purchases

Latest Updates

an it expert helping at a manufacturing site to aid in it support for manufacturing.
Managed Services

6 Ways IT Support for Manufacturing is Crucial

November 28, 2023
Image of computers in background with a graphic overlay with representing it solutions icons across the front.
Uncategorized

Revolutionizing Businesses: Innovative IT Solutions for Success

October 16, 2023
A business group connecting on their devices to their computer networking system.
Managed Services Network Monitoring

6 Reasons Why Computer Networking Services are Indispensable

September 15, 2023
ccsi logo

Creative Computer Solutions, Inc.

202 East Mill Plain Blvd.
Vanvouver, WA, 98660
Phone: (360) 944 - 5111
Phone (503) 980-3111
Fax: (360) 944 - 5444
Review Us

IT Services

  • VOIP Services
  • Security Services
  • Email Services
  • Business Relocation Services
  • Cloud Services
  • Data Backup Services
  • Managed Firewall Services
  • Managed Services

Quick Links

  • About Us
  • Careers
  • Community
  • Blog

Support

  • Live Cyber Threat Map
  • SANS Institute
  • MS Office Training
  • Small Business Development
  • Request Support
  • About
    • Our Story
    • Now Hiring
    • Community
  • Services
    • Managed Services
    • Managed Firewall Services
    • Data Backup Services
    • Cloud Services
    • Email Services
    • Business Relocation Services
    • Security Services
    • VOIP Services
  • Resources
    • Training
    • Live Cyber Threat Attack Map
    • SANS
    • Small Business Development
    • Request Support
    • Videos
    • Recycling
  • Blog
  • Contact Us
  • Remote Support
    • Connect to My PC
    • Join with Code