Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Three Tricks to Spot Phishing Attempts

Three Tricks to Spot Phishing Attempts

Cybersecurity needs to be a priority to any business that wants to continue their operations in the long-term. One threat that is very common today is the phishing attack.

In 2018, there was an increase in the prevalence of phishing attacks by 269 percent when compared to their prevalence in 2017. In addition, a full 32 percent of reported data breaches that year featured phishing to some extent. United States businesses may have had cause for the most concern, as nearly 86 percent of phishing attacks targeted American companies.

NCSAM’s Phishing-Heavy Theme: “Own IT. Secure IT. Protect IT.”

With National Cybersecurity Awareness Month well underway, it’s high time to pay attention to some of its lessons. These lessons effectively boil down to pretty basic practices that any user should cultivate into habits. Naturally, this includes some anti-phishing tactics.

Remember, you also have another knowledgeable resource to lean on for advice - we’re always available to assist you and your team. For instance, try implementing these best practices in your processes now to avoid phishing:

  • Don’t trust surprise messages: One of the first signs that a message is hiding a phishing attack is if it just appears in your inbox. Let’s say you suddenly get an email that says that it’s from Amazon, claiming that your account needs to have its payment credentials verified after some suspicious purchases were made. Stop and consider some other facts before you react… have you received something like a receipt in your inbox for something that you didn’t order, or an anticipated delivery date? Any emails can - and should - be examined in this way to ensure that you aren’t walking into a threat. It’s generally a good idea to reach out to the alleged sender through a different form of communication for confirmation.

  • Make sure the details match up: When we get an email, it’s pretty typical that we only take a quick glance at who sent it without giving it a second thought. If a cybercriminal is worth their salt, they would have used a fake email that isn’t quite perfect, but passes the “quick glance” test. For instance, would you sooner click on an email from “,” or one from “?”

    The right answer is “neither,” as in “neither A-C-L-M-I-N or G-R-N-A-I-L actually say what they appear to say at first.” Therefore, they are most likely traps.

  • Don’t trust surprise links or attachments, either: You need to be prepared before you even open a message, and this is one of the reasons why. Some links and attachments contain malware, or automatically direct you to a website that will begin installing the malware. Some have been especially tricky, asking the user to confirm the download, but completing the installation regardless of what they pick. Again, unless you expected an attachment or a link, think twice before just clicking through. It doesn’t hurt to confirm its legitimacy through another means, either.

Sure, October is National Cybersecurity Awareness Month, but hackers and cybercriminals don’t go into hibernation for the rest of the year. You should be sure that you’re just as secure for every one of the other 264 days as well. Voyage Technology can help - reach out to us at 800.618.9844 to learn more. 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 01 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Productivity Passwords Backup Quick Tips Saving Money Communication Cybersecurity Data Backup Managed Service Smartphone Android Upgrade AI Business Management VoIP Smartphones Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Network Current Events Remote Tech Term Internet of Things Information Automation Artificial Intelligence Facebook Covid-19 Cloud Computing Miscellaneous Gadgets Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Employee/Employer Relationship IT Support Spam Windows 10 Office Data Management Business Continuity Government Business Technology Wi-Fi Windows 10 Bandwidth Virtualization Blockchain Vendor Mobile Office Two-factor Authentication Data Security Apps Tip of the week Mobile Device Management Networking Gmail Chrome Managed Services Voice over Internet Protocol Budget BYOD Apple Employer-Employee Relationship App HIPAA Access Control Applications Hacker Computing Avoiding Downtime Information Technology Marketing Office 365 How To Conferencing BDR WiFi 2FA Health Router Computers Operating System Retail Risk Management Website Help Desk Managed IT Services Analytics Office Tips Augmented Reality Storage Healthcare Password Bring Your Own Device Big Data Virtual Private Network Going Green Paperless Office Infrastructure Microsoft 365 Customer Service Excel Solutions Cybercrime Document Management Monitoring Scam Data loss Firewall Telephone Patch Management Save Money Remote Workers Remote Monitoring The Internet of Things End of Support Vulnerability Vendor Management Cooperation Social Physical Security Free Resource Display Project Management Windows 11 Windows 7 Printer Mobility Multi-Factor Authentication Supply Chain Settings Printing Hacking Wireless Content Filtering Presentation User Tip Machine Learning Modem Mobile Security Employees YouTube Processor Integration Wireless Technology Cryptocurrency Maintenance Smart Technology Antivirus Holidays Virtual Desktop LiFi Word Data storage Data Storage Saving Time Data Privacy Video Conferencing Outlook Managed IT Service Managed Services Provider Virtual Machines Professional Services Money Humor Downloads Robot Safety Licensing Sports Entertainment iPhone Mouse IT Management VPN Meetings Vulnerabilities Administration Telephone System Cost Management Computer Repair Images 101 Customer Relationship Management Assessment Monitors Permissions Organization Directions Displays Smart Devices Cortana Competition Digital Security Cameras Specifications Alt Codes Remote Working Outsourcing Websites Memory Internet Exlporer Google Play Fraud Downtime Microchip Data Breach Electronic Health Records Username Workplace Electronic Medical Records SharePoint Videos Hosted Solution Black Friday Typing User Hiring/Firing Wasting Time Database Paperless Writing Security Cameras Lenovo Trend Micro Software as a Service Knowledge Co-managed IT Virtual Reality IT Technicians Google Drive Cyber Monday IP Address Server Management Proxy Server Technology Care Private Cloud Managing Costs Cookies 5G Tactics Business Communications SSID Hotspot Superfish Identity Theft eCommerce Unified Communications Surveillance Experience Scams Twitter Virtual Assistant Mirgation Google Docs Bitcoin Recovery Running Cable Hybrid Work Error Virtual Machine Nanotechnology Addiction Human Resources Social Engineering Medical IT Language Google Wallet Hard Drives Reviews Development Management Cables Remote Computing Transportation Chatbots Domains Distributed Denial of Service Windows 8 Laptop Hypervisor Screen Reader Optimization Service Level Agreement Google Apps PowerPoint Computing Infrastructure Drones Refrigeration Shopping Tablet IT Maintenance Alert Employer/Employee Relationships Identity Public Speaking Navigation Lithium-ion battery Managed IT PCI DSS Halloween Bookmark Business Intelligence File Sharing Smart Tech Dark Data Download Shortcuts How To Alerts Gig Economy Entrepreneur Internet Service Provider Ransmoware Notifications Teamwork Evernote Break Fix Hacks Regulations Compliance Scary Stories Browsers Vendors Travel Connectivity Google Maps Memes Fun Upload Be Proactive Undo Techology Deep Learning Net Neutrality Social Network Workforce SQL Server Multi-Factor Security Dark Web Financial Data Threats Unified Threat Management History IoT IT Trends Workplace Strategies Unified Threat Management Smartwatch Education Procurement Customer Resource management Meta Azure Regulations Google Calendar Network Congestion Tech Microsoft Excel Mobile Computing Application Telework Data Analysis Amazon Cyber security Star Wars Communitications Search Gamification Staff User Error CES IBM Best Practice Supply Chain Management Outsource IT Social Networking Legislation Media Term FinTech Buisness Fileless Malware Environment Point of Sale IT Assessment Content Wearable Technology Legal IT solutions Business Growth Network Management Flexibility Health IT Small Businesses Tech Support Value Motherboard Comparison

Blog Archive