Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Three Tricks to Spot Phishing Attempts

Three Tricks to Spot Phishing Attempts

Cybersecurity needs to be a priority to any business that wants to continue their operations in the long-term. One threat that is very common today is the phishing attack.

In 2018, there was an increase in the prevalence of phishing attacks by 269 percent when compared to their prevalence in 2017. In addition, a full 32 percent of reported data breaches that year featured phishing to some extent. United States businesses may have had cause for the most concern, as nearly 86 percent of phishing attacks targeted American companies.

NCSAM’s Phishing-Heavy Theme: “Own IT. Secure IT. Protect IT.”

With National Cybersecurity Awareness Month well underway, it’s high time to pay attention to some of its lessons. These lessons effectively boil down to pretty basic practices that any user should cultivate into habits. Naturally, this includes some anti-phishing tactics.

Remember, you also have another knowledgeable resource to lean on for advice - we’re always available to assist you and your team. For instance, try implementing these best practices in your processes now to avoid phishing:

  • Don’t trust surprise messages: One of the first signs that a message is hiding a phishing attack is if it just appears in your inbox. Let’s say you suddenly get an email that says that it’s from Amazon, claiming that your account needs to have its payment credentials verified after some suspicious purchases were made. Stop and consider some other facts before you react… have you received something like a receipt in your inbox for something that you didn’t order, or an anticipated delivery date? Any emails can - and should - be examined in this way to ensure that you aren’t walking into a threat. It’s generally a good idea to reach out to the alleged sender through a different form of communication for confirmation.

  • Make sure the details match up: When we get an email, it’s pretty typical that we only take a quick glance at who sent it without giving it a second thought. If a cybercriminal is worth their salt, they would have used a fake email that isn’t quite perfect, but passes the “quick glance” test. For instance, would you sooner click on an email from “,” or one from “?”

    The right answer is “neither,” as in “neither A-C-L-M-I-N or G-R-N-A-I-L actually say what they appear to say at first.” Therefore, they are most likely traps.

  • Don’t trust surprise links or attachments, either: You need to be prepared before you even open a message, and this is one of the reasons why. Some links and attachments contain malware, or automatically direct you to a website that will begin installing the malware. Some have been especially tricky, asking the user to confirm the download, but completing the installation regardless of what they pick. Again, unless you expected an attachment or a link, think twice before just clicking through. It doesn’t hurt to confirm its legitimacy through another means, either.

Sure, October is National Cybersecurity Awareness Month, but hackers and cybercriminals don’t go into hibernation for the rest of the year. You should be sure that you’re just as secure for every one of the other 264 days as well. Voyage Technology can help - reach out to us at 800.618.9844 to learn more. 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 25 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Productivity Smartphone Managed Service Data Backup Android Upgrade Business Management AI Smartphones VoIP Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Information Facebook Artificial Intelligence Automation Cloud Computing Miscellaneous Holiday Gadgets Training Covid-19 Managed Service Provider Remote Work Server Compliance Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Data Management Government Business Continuity Wi-Fi Blockchain Windows 10 Virtualization Bandwidth Business Technology Data Security Two-factor Authentication Vendor Apps Mobile Office Networking Managed Services Mobile Device Management Voice over Internet Protocol Gmail BYOD Chrome Budget Employer-Employee Relationship Apple Tip of the week App Computing How To Information Technology BDR HIPAA Applications Office 365 WiFi Access Control Conferencing Hacker Avoiding Downtime Marketing Managed IT Services Risk Management Healthcare Router Analytics Office Tips Augmented Reality Big Data Virtual Private Network Help Desk Storage Password Health Bring Your Own Device 2FA Computers Retail Website Operating System Remote Workers Firewall Patch Management Save Money Remote Monitoring Vulnerability End of Support The Internet of Things Vendor Management Free Resource Project Management Windows 7 Physical Security Monitoring Social Display Microsoft 365 Printer Paperless Office Solutions Infrastructure Windows 11 Customer Service Telephone Document Management Going Green Excel Cooperation Scam Cybercrime Data loss Telephone System Virtual Machines Professional Services YouTube Cost Management Word Cryptocurrency Robot iPhone Data Privacy Virtual Desktop LiFi Data storage Safety User Tip Modem Vulnerabilities Mobile Security Processor Outlook IT Management VPN Images 101 Meetings Money Humor Multi-Factor Authentication Mobility Smart Technology Computer Repair Sports Saving Time Mouse Customer Relationship Management Employees Administration Integration Managed IT Service Machine Learning Hacking Downloads Presentation Licensing Supply Chain Holidays Entertainment Wireless Technology Settings Maintenance Data Storage Antivirus Wireless Printing Content Filtering Video Conferencing Managed Services Provider Gig Economy Hard Drives Social Networking Legislation Technology Care Business Communications Knowledge Fileless Malware Tablet Internet Service Provider Domains Teamwork Google Drive Alert Wearable Technology Evernote Scams Regulations Compliance Content Managed IT 5G Health IT File Sharing Memes Refrigeration Motherboard Dark Data Comparison Hybrid Work Unified Communications Human Resources Experience Directions Net Neutrality Public Speaking Assessment How To SQL Server Google Docs Permissions Lithium-ion battery Notifications History Bitcoin Cables Running Cable Financial Data Smartwatch Travel IT Google Wallet Entrepreneur Specifications Fraud Google Apps Techology Microchip Google Maps Procurement Internet Exlporer Azure Username Cyber security Tech Windows 8 IT Maintenance Laptop Telework CES Unified Threat Management Communitications Undo Drones Black Friday Business Intelligence Shortcuts Unified Threat Management Supply Chain Management Database IT Technicians Term Ransmoware Halloween FinTech Proxy Server IT Assessment Cookies Network Congestion Cyber Monday Vendors Hotspot Be Proactive User Error Flexibility Tactics Value Organization Application Mirgation Hacks Workforce Scary Stories Fun Digital Security Cameras Point of Sale Smart Devices Nanotechnology Threats Memory Language Deep Learning Workplace Strategies Remote Working IBM Addiction Network Management Management Tech Support Data Breach Chatbots Google Play Meta Amazon Education Videos Electronic Health Records Screen Reader Monitors Distributed Denial of Service Wasting Time Computing Infrastructure Service Level Agreement Websites Trend Micro Identity Security Cameras Mobile Computing Outsource IT Environment Media Search Bookmark Software as a Service Competition Smart Tech Electronic Medical Records Managing Costs Alerts Best Practice SharePoint Download eCommerce SSID Small Businesses Buisness Displays IT solutions Lenovo Browsers Surveillance Connectivity Writing Virtual Assistant Legal Break Fix Virtual Reality Virtual Machine User Business Growth Upload Server Management Reviews Social Network Private Cloud Medical IT Multi-Factor Security Outsourcing Superfish Cortana Identity Theft Development IoT Transportation Dark Web Twitter Hypervisor Alt Codes Workplace IP Address Trends Shopping Customer Resource management Error Optimization Regulations PowerPoint Google Calendar Hiring/Firing Downtime Hosted Solution Paperless Data Analysis Star Wars Social Engineering Employer/Employee Relationships Microsoft Excel Remote Computing Recovery Staff Navigation Typing Co-managed IT PCI DSS Gamification

Blog Archive