Security Awareness: 5 Easy Ways to Detect Spam

Nov 8, 2017 9:50:00 AM

Cybersecurity is an increasingly important business focus. One of the most important pieces of any security solution is making sure your employees have the knowledge and understanding to protect themselves against security threats.

pexels-photo-92628.jpgThe following are 5 easy ways to detect Spam and defend yourself against potential cybersecurity attacks:

1. Look at the address of the sender. If the email address does not show the domain name of the entity that the sender supposedly represents, this is a certain red flag.

· Although emails can appear to come from legitimate sources, you should verify.

· The sender in the example below supposedly represented the BBB (Better Business Bureau). Note the @ is not in line with the company the purport to represent in this example:

From: Peter S Rogers [mailto:lonelyowner@hanmail.net]

2. Notice Embedded links: With any links, you can hover your mouse of the link to see what the true URL (web address) is. In the below picture, hovering shows that the actual URL will send you to a malware site and not to the link as displayed. NEVER click on an email link requesting you to reset your password, unless you specifically have requested this and are expecting the email. Even then hover your mouse over the link, to display its true path, or copy and paste the link into your browser.

blog1.png

3. Spelling and Grammar: Any business correspondence, will net have spelling or grammatical errors. If you notice grammatical or spelling errors throughout the message, you are most likely reading Spam.

4. Be aware of urgent and threatening language: Invoking urgency or fear is a phishing tactic. Be wary of subject lines such as “account has been suspended” or “unauthorized login attempt”. These are the same tactics used by advertisements to make you think you must rush out and buy now: “Limited Time Offer”, “Act Now”, “Don’t Miss This Opportunity.”

5. DO NOT CLICK ON ATTACHMENTS: Note the inconsistencies in this example.

blog2.png

Our team and expert partners stay on top of the latest trends and vulnerabilities in-order-to provide the most up-to-date protection for your systems and data, so you can stay out of the headlines. We will work with you to develop a comprehensive security solution that aligns your IT operations and your internal security program, this includes an end-user security awareness Computer Based Training (CBT) that uses the latest eLearning techniques and trends. Learn more today! 

Greg Taylor

Written by Greg Taylor

Greg Taylor is a Systems Engineer at Istonish.

Lists by Topic

see all

Posts by Topic

see all

Recent Posts