One of the top concerns for many businesses in the age of the computer is IT security and ensuring that corporate data stays where is should. In the technology industry it is a constant cat and mouse game to keep connected networks out of harm’s way. As fast as new vulnerabilities are released programmers quickly scramble to patch update. Although Antivirus, anti-malware, and anti-phishing software exists, most cyber security breaches are caused by human error.
Email is a great method of communications for business because it is easily accessible, fast, and provides a written record of conversations. Unlike a meeting in person or a phone conversation it is a little harder to tell if the person on the other end is who they claim to be. These deceptive emails are called Phishing Scams and are aimed at deceiving the victim to obtain sensitive information. For the messages that our spam filter doesn’t catch, here are some security tips to help identify these types of scams.
Rule #1 – Trust your instinct and take it slow.
If something seems even a little suspicious, it is always better to err on the side of caution. If you suspect a friend or colleague has sent something questionable, call them and ask about it. Always take your time and re-read the email. Phishing scams will usually have a sense of urgency such as an overdue payment, or cancellation of services. Scammers are using the art of deception to obtain information, and they want you to act before you think.
Rule #2 – Check the Reply address.
If an email is recognized as potential spam, make sure the Sender’s address matches the Reply-To address. When an email address has been compromised the scammer will use the compromised account to infect others. When they send these emails out the “Reply-To” address is changed to prevent the victim from knowing that their email address has been compromised. If the “Reply-To” goes to an unrecognized email quarantine the message and use a different method of communication to contact the victim.
Rule #3 – Check the link before you click.
Verify the hyperlinks contained in emails are not misleading you. A scammer cannot do any harm just by sending an email, it is the responding action after the email is sent that does the damage. When phishing scammers send out an email, they put links in attachments, photos, or text that may look legitimate. The link text may say something like login.bank.com but when you click on it will take you somewhere else entirely. An easy way to find the real location of the link is to hover over it with the cursor, or right click and copy the link location. From there the URL location will be displayed and can be verified by the user. Links can also be attached to images embedded in the email, so be sure to check those too.
IT security is a constant battle and scammers are always thinking of clever ways to compromise accounts or obtain sensitive information. Following these rules will help you build your biological firewall and improve your email security. Trust your instinct, take your time, and always inspect before you click.
Stay safe out there.