Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Three Tricks to Spot Phishing Attempts

Three Tricks to Spot Phishing Attempts

Cybersecurity needs to be a priority to any business that wants to continue their operations in the long-term. One threat that is very common today is the phishing attack.

In 2018, there was an increase in the prevalence of phishing attacks by 269 percent when compared to their prevalence in 2017. In addition, a full 32 percent of reported data breaches that year featured phishing to some extent. United States businesses may have had cause for the most concern, as nearly 86 percent of phishing attacks targeted American companies.

NCSAM’s Phishing-Heavy Theme: “Own IT. Secure IT. Protect IT.”

With National Cybersecurity Awareness Month well underway, it’s high time to pay attention to some of its lessons. These lessons effectively boil down to pretty basic practices that any user should cultivate into habits. Naturally, this includes some anti-phishing tactics.

Remember, you also have another knowledgeable resource to lean on for advice - we’re always available to assist you and your team. For instance, try implementing these best practices in your processes now to avoid phishing:

  • Don’t trust surprise messages: One of the first signs that a message is hiding a phishing attack is if it just appears in your inbox. Let’s say you suddenly get an email that says that it’s from Amazon, claiming that your account needs to have its payment credentials verified after some suspicious purchases were made. Stop and consider some other facts before you react… have you received something like a receipt in your inbox for something that you didn’t order, or an anticipated delivery date? Any emails can - and should - be examined in this way to ensure that you aren’t walking into a threat. It’s generally a good idea to reach out to the alleged sender through a different form of communication for confirmation.

  • Make sure the details match up: When we get an email, it’s pretty typical that we only take a quick glance at who sent it without giving it a second thought. If a cybercriminal is worth their salt, they would have used a fake email that isn’t quite perfect, but passes the “quick glance” test. For instance, would you sooner click on an email from “,” or one from “?”

    The right answer is “neither,” as in “neither A-C-L-M-I-N or G-R-N-A-I-L actually say what they appear to say at first.” Therefore, they are most likely traps.

  • Don’t trust surprise links or attachments, either: You need to be prepared before you even open a message, and this is one of the reasons why. Some links and attachments contain malware, or automatically direct you to a website that will begin installing the malware. Some have been especially tricky, asking the user to confirm the download, but completing the installation regardless of what they pick. Again, unless you expected an attachment or a link, think twice before just clicking through. It doesn’t hurt to confirm its legitimacy through another means, either.

Sure, October is National Cybersecurity Awareness Month, but hackers and cybercriminals don’t go into hibernation for the rest of the year. You should be sure that you’re just as secure for every one of the other 264 days as well. Voyage Technology can help - reach out to us at 800.618.9844 to learn more. 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 21 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Email Workplace Tips Phishing Google Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Managed Service Mobile Device Microsoft Productivity Passwords Saving Money Quick Tips AI Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Artificial Intelligence Facebook Holiday Automation Cloud Computing Compliance Training Gadgets Covid-19 Outsourced IT Server Managed Service Provider Remote Work IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Windows 10 Bandwidth Virtualization Blockchain Business Technology Wi-Fi Two-factor Authentication Mobile Office Data Security Managed Services Apps Vendor Networking Mobile Device Management Chrome Voice over Internet Protocol Gmail Budget BYOD WiFi Apple App Employer-Employee Relationship Tip of the week Information Technology Avoiding Downtime Managed IT Services Marketing How To Office 365 BDR Conferencing Password Physical Security Access Control HIPAA Computing Applications Hacker Risk Management 2FA Website Help Desk Analytics Office Tips Augmented Reality Healthcare Storage Bring Your Own Device Big Data Virtual Private Network Health Operating System Router Computers Retail Scam Windows 11 Data loss Monitoring Excel Firewall Patch Management Save Money Remote Workers Managed IT Service Remote Monitoring End of Support Telephone Vulnerability Vendor Management The Internet of Things Cooperation Free Resource Display Project Management Printer Windows 7 Social Paperless Office Microsoft 365 Infrastructure Going Green Solutions Document Management Customer Service Cybercrime Mobile Security Maintenance Processor Cryptocurrency Antivirus Wireless Technology Holidays Data Storage Virtual Desktop Data storage LiFi Smart Technology Supply Chain Video Conferencing Word Managed Services Provider Outlook Saving Time Virtual Machines Professional Services Robot Money Humor Downloads iPhone Safety Sports Licensing IT Management Mouse VPN Meetings Vulnerabilities Entertainment Data Privacy Administration Computer Repair Images 101 Telephone System Multi-Factor Authentication Mobility Cost Management Customer Relationship Management Settings Printing Wireless Machine Learning Employees Content Filtering Integration Hacking YouTube Presentation User Tip Modem Virtual Assistant Outsource IT Twitter Database Surveillance IT Technicians Virtual Machine Environment 5G Media Error IP Address Social Engineering Google Docs Proxy Server Reviews Unified Communications Cookies Experience Cyber Monday Medical IT Running Cable Hotspot Transportation Small Businesses Remote Computing Bitcoin Tactics Development Google Wallet Mirgation Hypervisor Displays Tablet Shopping Recovery Nanotechnology Optimization PowerPoint Laptop Language Employer/Employee Relationships Outsourcing Alert Hard Drives Windows 8 Addiction Domains Dark Data Drones Management PCI DSS Chatbots Managed IT Navigation File Sharing How To Gig Economy Screen Reader Distributed Denial of Service Workplace Halloween Computing Infrastructure Teamwork Hiring/Firing Notifications Refrigeration Service Level Agreement Internet Service Provider Public Speaking Regulations Compliance Identity Evernote Paperless Travel Google Maps Lithium-ion battery Bookmark Smart Tech Memes Techology Co-managed IT Download Net Neutrality Entrepreneur Scary Stories Alerts SQL Server Technology Care Hacks Financial Data History Fun Business Communications Unified Threat Management Break Fix Scams Browsers Smartwatch Deep Learning Connectivity IT Unified Threat Management Upload Procurement Azure Hybrid Work Undo Network Congestion Social Network Telework Education Cyber security Multi-Factor Security Tech Human Resources User Error Dark Web Cables CES IoT Communitications Mobile Computing Trends Supply Chain Management Point of Sale Customer Resource management FinTech Regulations Search Google Calendar Term Google Apps Microsoft Excel IT Maintenance Data Analysis Application Best Practice Star Wars IT Assessment Gamification Flexibility Buisness Staff Value Business Intelligence Network Management Tech Support IBM Monitors Legal Organization IT solutions Social Networking Legislation Shortcuts Ransmoware Fileless Malware Digital Security Cameras Business Growth Smart Devices Content Remote Working Wearable Technology Memory Vendors Websites Health IT Motherboard Data Breach Cortana Comparison Google Play Be Proactive SharePoint Permissions Workforce Electronic Medical Records Directions Videos Alt Codes Assessment Electronic Health Records Downtime Wasting Time Threats Competition Writing Hosted Solution Trend Micro Lenovo Specifications Security Cameras Workplace Strategies Fraud Meta Virtual Reality Microchip Typing Internet Exlporer Software as a Service Username Managing Costs Amazon Server Management Private Cloud Identity Theft Google Drive User eCommerce Superfish Knowledge Black Friday SSID

Blog Archive