Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Three Tricks to Spot Phishing Attempts

Three Tricks to Spot Phishing Attempts

Cybersecurity needs to be a priority to any business that wants to continue their operations in the long-term. One threat that is very common today is the phishing attack.

In 2018, there was an increase in the prevalence of phishing attacks by 269 percent when compared to their prevalence in 2017. In addition, a full 32 percent of reported data breaches that year featured phishing to some extent. United States businesses may have had cause for the most concern, as nearly 86 percent of phishing attacks targeted American companies.

NCSAM’s Phishing-Heavy Theme: “Own IT. Secure IT. Protect IT.”

With National Cybersecurity Awareness Month well underway, it’s high time to pay attention to some of its lessons. These lessons effectively boil down to pretty basic practices that any user should cultivate into habits. Naturally, this includes some anti-phishing tactics.

Remember, you also have another knowledgeable resource to lean on for advice - we’re always available to assist you and your team. For instance, try implementing these best practices in your processes now to avoid phishing:

  • Don’t trust surprise messages: One of the first signs that a message is hiding a phishing attack is if it just appears in your inbox. Let’s say you suddenly get an email that says that it’s from Amazon, claiming that your account needs to have its payment credentials verified after some suspicious purchases were made. Stop and consider some other facts before you react… have you received something like a receipt in your inbox for something that you didn’t order, or an anticipated delivery date? Any emails can - and should - be examined in this way to ensure that you aren’t walking into a threat. It’s generally a good idea to reach out to the alleged sender through a different form of communication for confirmation.

  • Make sure the details match up: When we get an email, it’s pretty typical that we only take a quick glance at who sent it without giving it a second thought. If a cybercriminal is worth their salt, they would have used a fake email that isn’t quite perfect, but passes the “quick glance” test. For instance, would you sooner click on an email from “,” or one from “?”

    The right answer is “neither,” as in “neither A-C-L-M-I-N or G-R-N-A-I-L actually say what they appear to say at first.” Therefore, they are most likely traps.

  • Don’t trust surprise links or attachments, either: You need to be prepared before you even open a message, and this is one of the reasons why. Some links and attachments contain malware, or automatically direct you to a website that will begin installing the malware. Some have been especially tricky, asking the user to confirm the download, but completing the installation regardless of what they pick. Again, unless you expected an attachment or a link, think twice before just clicking through. It doesn’t hurt to confirm its legitimacy through another means, either.

Sure, October is National Cybersecurity Awareness Month, but hackers and cybercriminals don’t go into hibernation for the rest of the year. You should be sure that you’re just as secure for every one of the other 264 days as well. Voyage Technology can help - reach out to us at 800.618.9844 to learn more. 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 19 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Workplace Tips Privacy Email Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Data Backup Smartphone AI Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Automation Facebook Information Miscellaneous Artificial Intelligence Holiday Covid-19 Gadgets Cloud Computing Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Business Technology Blockchain Virtualization Bandwidth Two-factor Authentication Vendor Apps Data Security Mobile Office Gmail Tip of the week WiFi Chrome Employer-Employee Relationship Networking Budget Apple Managed Services Voice over Internet Protocol BYOD App Mobile Device Management Computing Access Control Information Technology HIPAA Office 365 Applications How To BDR Hacker Conferencing Avoiding Downtime Marketing Health Risk Management Router Big Data Retail Analytics Office Tips Augmented Reality Managed IT Services 2FA Storage Password Help Desk Bring Your Own Device Computers Healthcare Website Physical Security Virtual Private Network Operating System Windows 7 Paperless Office Firewall Infrastructure Microsoft 365 Solutions The Internet of Things Document Management Social Scam Data loss Windows 11 Monitoring Customer Service Excel Patch Management Save Money Remote Monitoring Vulnerability End of Support Remote Workers Vendor Management Telephone Going Green Display Printer Cooperation Free Resource Cybercrime Project Management YouTube Images 101 Cryptocurrency Telephone System Multi-Factor Authentication Mobility Cost Management Safety Machine Learning Virtual Desktop Data storage LiFi Employees Integration Maintenance Outlook User Tip Modem Antivirus Mobile Security Money Processor Humor Holidays Customer Relationship Management Data Storage Smart Technology Supply Chain Sports Video Conferencing Mouse Hacking Managed Services Provider Professional Services Presentation Robot Saving Time Virtual Machines Administration Managed IT Service Wireless Technology IT Management Downloads VPN iPhone Meetings Licensing Settings Vulnerabilities Printing Word Entertainment Wireless Content Filtering Data Privacy Computer Repair Microsoft Excel IT Maintenance Public Speaking Monitors Data Analysis Star Wars IT Assessment Knowledge Gamification Flexibility Staff Value Business Intelligence Lithium-ion battery Google Drive Websites Entrepreneur Organization Social Networking Legislation Shortcuts Ransmoware Fileless Malware Digital Security Cameras 5G Smart Devices Experience Content Remote Working SharePoint Wearable Technology Memory Vendors Google Docs Electronic Medical Records Unified Communications Undo Bitcoin Running Cable Health IT Motherboard Data Breach Comparison Google Play Be Proactive Lenovo Permissions Workforce Google Wallet Writing Directions Videos Assessment Electronic Health Records Wasting Time Threats Virtual Reality Private Cloud Windows 8 Laptop Trend Micro Server Management Specifications Security Cameras Workplace Strategies Internet Exlporer Software as a Service Superfish Fraud Meta Identity Theft Drones Microchip Username Managing Costs Amazon Application Twitter Black Friday SSID Error Halloween eCommerce Database Surveillance Virtual Assistant Outsource IT IBM Social Engineering IT Technicians Virtual Machine Environment Media Remote Computing Cyber Monday Medical IT Hacks Scary Stories Proxy Server Reviews Cookies Fun Tactics Development Hotspot Transportation Small Businesses Tablet Alert Deep Learning Mirgation Hypervisor Displays Managed IT PowerPoint Competition File Sharing Dark Data Shopping Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing How To Education Notifications Management PCI DSS Chatbots Navigation Distributed Denial of Service Workplace Travel Mobile Computing Gig Economy Screen Reader Search Service Level Agreement Internet Service Provider Techology Computing Infrastructure Teamwork Hiring/Firing Google Maps User Best Practice Regulations Compliance Identity Evernote Paperless Co-managed IT Unified Threat Management Buisness Bookmark Smart Tech Memes Download Net Neutrality Unified Threat Management Alerts SQL Server Technology Care IP Address Legal IT solutions Business Growth Financial Data History Business Communications Break Fix Scams Network Congestion Browsers Smartwatch Connectivity IT Cortana Upload Procurement User Error Azure Hybrid Work Recovery Hard Drives Alt Codes Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Domains Point of Sale Downtime CES IoT Communitications Trends Supply Chain Management Hosted Solution Refrigeration Tech Support Typing Customer Resource management FinTech Regulations Network Management Google Calendar Term Google Apps

Blog Archive