Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Three Tricks to Spot Phishing Attempts

Three Tricks to Spot Phishing Attempts

Cybersecurity needs to be a priority to any business that wants to continue their operations in the long-term. One threat that is very common today is the phishing attack.

In 2018, there was an increase in the prevalence of phishing attacks by 269 percent when compared to their prevalence in 2017. In addition, a full 32 percent of reported data breaches that year featured phishing to some extent. United States businesses may have had cause for the most concern, as nearly 86 percent of phishing attacks targeted American companies.

NCSAM’s Phishing-Heavy Theme: “Own IT. Secure IT. Protect IT.”

With National Cybersecurity Awareness Month well underway, it’s high time to pay attention to some of its lessons. These lessons effectively boil down to pretty basic practices that any user should cultivate into habits. Naturally, this includes some anti-phishing tactics.

Remember, you also have another knowledgeable resource to lean on for advice - we’re always available to assist you and your team. For instance, try implementing these best practices in your processes now to avoid phishing:

  • Don’t trust surprise messages: One of the first signs that a message is hiding a phishing attack is if it just appears in your inbox. Let’s say you suddenly get an email that says that it’s from Amazon, claiming that your account needs to have its payment credentials verified after some suspicious purchases were made. Stop and consider some other facts before you react… have you received something like a receipt in your inbox for something that you didn’t order, or an anticipated delivery date? Any emails can - and should - be examined in this way to ensure that you aren’t walking into a threat. It’s generally a good idea to reach out to the alleged sender through a different form of communication for confirmation.

  • Make sure the details match up: When we get an email, it’s pretty typical that we only take a quick glance at who sent it without giving it a second thought. If a cybercriminal is worth their salt, they would have used a fake email that isn’t quite perfect, but passes the “quick glance” test. For instance, would you sooner click on an email from “,” or one from “?”

    The right answer is “neither,” as in “neither A-C-L-M-I-N or G-R-N-A-I-L actually say what they appear to say at first.” Therefore, they are most likely traps.

  • Don’t trust surprise links or attachments, either: You need to be prepared before you even open a message, and this is one of the reasons why. Some links and attachments contain malware, or automatically direct you to a website that will begin installing the malware. Some have been especially tricky, asking the user to confirm the download, but completing the installation regardless of what they pick. Again, unless you expected an attachment or a link, think twice before just clicking through. It doesn’t hurt to confirm its legitimacy through another means, either.

Sure, October is National Cybersecurity Awareness Month, but hackers and cybercriminals don’t go into hibernation for the rest of the year. You should be sure that you’re just as secure for every one of the other 264 days as well. Voyage Technology can help - reach out to us at 800.618.9844 to learn more. 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 31 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Quick Tips Managed Service Saving Money Passwords Cybersecurity Communication Smartphone Data Backup AI Android Upgrade Disaster Recovery Data Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Information Artificial Intelligence Holiday Facebook Automation Miscellaneous Cloud Computing Training Covid-19 Gadgets Managed Service Provider Remote Work Compliance Server IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Windows 10 Office Government Data Management Business Continuity Windows 10 Bandwidth Virtualization Business Technology Wi-Fi Blockchain Vendor Apps Data Security Two-factor Authentication Mobile Office Mobile Device Management BYOD Chrome Gmail Budget WiFi Apple Tip of the week App Employer-Employee Relationship Networking Managed Services Voice over Internet Protocol Office 365 HIPAA Applications Access Control Conferencing Computing Hacker How To Information Technology Avoiding Downtime BDR Marketing Analytics Office Tips Augmented Reality Router Virtual Private Network Storage Password Bring Your Own Device Health Help Desk Big Data Retail 2FA Operating System Computers Managed IT Services Risk Management Healthcare Website Remote Monitoring Vulnerability End of Support Free Resource Vendor Management Project Management Firewall Windows 7 Physical Security Microsoft 365 Display Printer The Internet of Things Paperless Office Solutions Infrastructure Monitoring Social Document Management Going Green Windows 11 Telephone Scam Customer Service Data loss Excel Cybercrime Cooperation Remote Workers Patch Management Save Money Word Vulnerabilities Data Privacy Outlook IT Management Images 101 VPN Money Meetings Humor Multi-Factor Authentication Mobility User Tip Modem Computer Repair Mobile Security Processor Safety Sports Mouse Employees Smart Technology Integration Administration Machine Learning Saving Time Holidays Managed IT Service Customer Relationship Management Maintenance Settings Data Storage Antivirus Printing Supply Chain Downloads Wireless Content Filtering Video Conferencing Hacking Managed Services Provider Licensing Presentation Virtual Machines Professional Services YouTube Entertainment Cryptocurrency Wireless Technology Telephone System iPhone Virtual Desktop Robot LiFi Data storage Cost Management Telework Content Hard Drives Cyber security Windows 8 Wearable Technology Tech Human Resources Laptop CES Health IT Domains Communitications Drones Unified Threat Management Motherboard Cables Comparison Permissions Unified Threat Management Directions Supply Chain Management Assessment FinTech Refrigeration Term Google Apps Halloween Public Speaking IT Assessment IT Maintenance Network Congestion Specifications Value Business Intelligence Fraud User Error Microchip Lithium-ion battery Flexibility Internet Exlporer Organization Username Hacks Entrepreneur Shortcuts Scary Stories Fun Digital Security Cameras Smart Devices Point of Sale Ransmoware Black Friday Database Memory Vendors Deep Learning Remote Working Network Management Undo Data Breach Tech Support IT Technicians Google Play Be Proactive Monitors Cyber Monday Videos Proxy Server Electronic Health Records Cookies Workforce Education Tactics Wasting Time Threats Hotspot Trend Micro Mobile Computing Websites Mirgation Security Cameras Workplace Strategies Search Software as a Service Nanotechnology Meta Addiction Application Managing Costs Amazon Best Practice Electronic Medical Records Language SharePoint Management eCommerce Chatbots SSID Buisness Writing Distributed Denial of Service Lenovo IBM Surveillance Legal Screen Reader Virtual Assistant Outsource IT IT solutions Service Level Agreement Virtual Machine Environment Business Growth Virtual Reality Computing Infrastructure Media Reviews Server Management Private Cloud Identity Medical IT Cortana Superfish Bookmark Development Identity Theft Smart Tech Transportation Small Businesses Download Hypervisor Displays Alt Codes Twitter Alerts Shopping Competition Optimization Error PowerPoint Downtime Social Engineering Break Fix Browsers Connectivity Employer/Employee Relationships Outsourcing Hosted Solution Upload Typing Remote Computing Navigation PCI DSS Gig Economy Social Network Workplace Multi-Factor Security Dark Web Knowledge Internet Service Provider Google Drive Tablet IoT User Teamwork Hiring/Firing Regulations Compliance Trends Alert Evernote Paperless 5G Managed IT Customer Resource management Memes File Sharing Regulations Co-managed IT Dark Data Google Calendar SQL Server Technology Care Unified Communications How To Microsoft Excel Experience Data Analysis IP Address Net Neutrality Google Docs Star Wars Financial Data Gamification History Bitcoin Notifications Staff Business Communications Running Cable Smartwatch IT Google Wallet Travel Social Networking Scams Legislation Recovery Azure Hybrid Work Techology Fileless Malware Procurement Google Maps

Blog Archive