Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

What Phishing Emails Need To Work
First and foremost, a phishing email will need to be convincing before it will trick its victim. You wouldn’t trust an email from your bank where they misspell your name and the name of the bank itself, would you? Unfortunately, many phishing attempts have grown more elaborate and attentive-to-detail, so you need to pay closer attention to spot the discrepancies between a phishing email and a legitimate one. This is where checking any URLs in the message come in.

The Dangers of a Deceptive URL
Most phishing attempts depend on the user to click through to a website that then steals their credentials. The fact that they can hide the URL behind the contents of their message only makes it easier for a cybercriminal to hook an unsuspecting victim. The target reads the message and naively clicks through to the website -- at least, in theory.

How to Avoid Being Phished
The first thing you need to do is to consider all of the warning signs of a phishing email. However, if there’s an included link in any incoming message, you need to be especially wary as you evaluate that. Fortunately, this is a fairly simple, straightforward process. Rather than clicking through the link, simply hover your cursor over it. The associated URL will appear. If the URL isn’t going to the domain you expect it to, you need to avoid it. For example, if an email that looks like it is from PayPal wants you to go to payypal.com and confirm your username and password, chances are it’s a scam and you’ll be giving your credentials to hackers.

Make sure you ask yourself, does it make sense, considering who the supposed sender is? Does it match the URL associated with the sender’s email?

If it doesn’t, you are likely the intended target of a phishing email. Whatever you do, don’t click on that link, as that is likely all it would take to infect your system.

Voyage Technology can help you keep your systems clear of similar threats through our preventative monitoring services and educational resources. Call us at 800.618.9844 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 23 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Microsoft Productivity Quick Tips Passwords Saving Money Communication AI Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Holiday Automation Artificial Intelligence Facebook Miscellaneous Information Training Compliance Gadgets Covid-19 Cloud Computing Server Managed Service Provider Outsourced IT Remote Work IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Managed Services Data Security Apps Mobile Device Management Tip of the week Voice over Internet Protocol Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Computing Hacker Physical Security Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing Managed IT Services How To BDR HIPAA Computers Router Virtual Private Network Risk Management 2FA Website Health Help Desk Office Tips Analytics Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Big Data Operating System Windows 11 Display Printer Paperless Office Excel Infrastructure Monitoring Remote Workers Firewall Document Management Managed IT Service Telephone Scam Free Resource The Internet of Things Project Management Data loss Windows 7 Cooperation Social Microsoft 365 Going Green Patch Management Solutions Save Money Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Cybercrime VPN YouTube Meetings Presentation Holidays Cryptocurrency User Tip Modem Wireless Technology Computer Repair Mobile Security Data Storage Processor Supply Chain Video Conferencing Virtual Desktop Data storage Managed Services Provider LiFi Virtual Machines Professional Services Word Smart Technology Outlook Machine Learning Money Saving Time Humor iPhone Safety Maintenance Antivirus Vulnerabilities Sports Downloads Mouse Data Privacy Licensing Images 101 Entertainment Administration Mobility Multi-Factor Authentication Telephone System Robot Customer Relationship Management Cost Management Settings Employees Printing Integration Wireless Content Filtering IT Management Hacking Surveillance Virtual Assistant Outsource IT Network Congestion Specifications Media Knowledge Fraud User Google Drive User Error Microchip Virtual Machine Environment Internet Exlporer Username Medical IT Reviews Development Transportation Small Businesses Point of Sale 5G Black Friday IP Address Experience Google Docs Hypervisor Displays Unified Communications Database Optimization Bitcoin Network Management PowerPoint Running Cable Tech Support IT Technicians Shopping Google Wallet Proxy Server Employer/Employee Relationships Outsourcing Cookies Monitors Cyber Monday Navigation Hotspot Recovery PCI DSS Tactics Windows 8 Workplace Laptop Websites Mirgation Hard Drives Gig Economy Internet Service Provider Drones Teamwork Hiring/Firing Nanotechnology Domains Evernote Paperless Electronic Medical Records Language Regulations Compliance SharePoint Addiction Memes Management Co-managed IT Halloween Chatbots Refrigeration Net Neutrality Lenovo SQL Server Technology Care Screen Reader Public Speaking Writing Distributed Denial of Service Business Communications Lithium-ion battery Virtual Reality Computing Infrastructure Financial Data History Service Level Agreement IT Hacks Server Management Scams Scary Stories Private Cloud Identity Entrepreneur Smartwatch Procurement Superfish Bookmark Azure Hybrid Work Identity Theft Smart Tech Fun Tech Human Resources Twitter Alerts Telework Cyber security Deep Learning Download Communitications Cables Error Undo CES Supply Chain Management Browsers Education Connectivity Social Engineering Break Fix Term Google Apps Remote Computing FinTech Upload IT Assessment Mobile Computing Social Network IT Maintenance Multi-Factor Security Flexibility Value Business Intelligence Tablet IoT Search Dark Web Best Practice Trends Shortcuts Alert Application Organization Smart Devices Managed IT Customer Resource management Ransmoware Buisness File Sharing Regulations Dark Data Google Calendar Digital Security Cameras How To Microsoft Excel Remote Working Legal Data Analysis Memory Vendors IT solutions Star Wars IBM Business Growth Gamification Google Play Be Proactive Notifications Staff Data Breach Videos Electronic Health Records Workforce Travel Social Networking Legislation Cortana Techology Fileless Malware Wasting Time Threats Google Maps Trend Micro Alt Codes Content Security Cameras Workplace Strategies Wearable Technology Software as a Service Health IT Meta Downtime Unified Threat Management Motherboard Competition Comparison Permissions Unified Threat Management Directions Managing Costs Amazon Hosted Solution Assessment eCommerce Typing SSID

Blog Archive