Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

If an Email Subject is Urgent, Be Skeptical

Important Update! Urgent! Expires in 1 Day! Confirm your Email Now! Your Password Has Been Stolen!

This type of messaging is often used in some of the most disarming phishing emails. As a business owner, you and your staff need to be vigilant when it comes to catching these scams.

Phishing Attacks are a Growing Problem

When we think about hackers, we always think about technologically brilliant social outcasts sitting in front of half a dozen screens trying to digitally rob banks. That’s a fun way to portray them in television and movies, but these days it doesn’t really take a lot of technical know-how to run the most successful scams in the cybercriminal’s playbook.

In fact, cybercriminals rely less on new breakthroughs and more on new psychological ways to trick users. Why invest all that time and effort breaking through modern cybersecurity protections when you can practically ask a user to hand over their password?

Phishing attacks are prominent today because they work. Users fall for them, and you almost can’t blame them for it. A phishing email is an email that looks legitimate, and is usually spoofing a legitimate site or service.

For example, a phishing email might look like it’s coming from your bank. The from address appears (at first glance) to be coming from a real email address from your bank. It might even get filtered normally, if you already have filters in place to organize email from your bank. Clicking into the email, you’ll see your bank’s logo.

Everything will look very real and very legitimate, at first glance.

That’s why phishing attacks are so easy to fall for.

The email itself usually isn’t dangerous on its own, although it could have links to dangerous sites, or contain attachments that are dangerous. Most of the danger lies in where the email instructs the user to go.

How to Spot a Phishing Attack

First of all, if an email seems too good to be true, or extremely urgent, or it’s asking for password information that you didn’t trigger, immediately be skeptical.

  1. Carefully hover (don’t click!) over links and see if they go to a legitimate URL. If the email is from Paypal, a link should lead back to or If there is anything strange between ‘paypal’ and the ‘.com’ then something is suspicious. There should also be a forward slash (/) after the .com. If the URL was something like, then you are being spoofed. Everyone handles their domains a little differently, but use this as a general rule of thumb:
    • a. - Safe
    • b. - Safe
    • c. - Safe
    • d. - Safe
    • e. - Suspicious! (notice the dot immediately after Paypal’s domain name)
    • f. - Suspicious!
    • g. - Suspicious! Don’t trust dots after the domain!
  2. Check the email in the header. An email from Amazon wouldn’t come in as . Do a quick Google search for the email address to see if it is legitimate.
  3. Always be careful opening attachments. If there is an attachment or link on the email, be extra cautious.
  4. Be skeptical of password alerts. If the email mentions passwords, such as “your password has been stolen,” be suspicious. 

When in doubt, it’s best to be skeptical of an email. That doesn’t mean email correspondence has to be distrusted though. If your business has a solid spam-blocking solution in place, it can help weed out some (not always all) phishing attacks.

If you are getting suspicious emails and want us to take a look, give us a call at 954-739-4700.

Ransomware is a Nasty Thing to Get
Switch the Hosted Email to Save Money


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 05 August 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Efficiency Productivity Network Security Hackers Google Malware Microsoft Data Innovation Business Software Smartphones User Tips Hosted Solutions Hardware Email Miscellaneous Communication Backup Workplace Tips communications Internet Mobile Devices Computer Small Business Android IT Support VoIP Smartphone Productivity Business Management Cybersecurity Ransomware Outsourced IT Mobile Device Upgrade Windows Windows 10 Social Media Network Browser Managed IT Services Tech Term Collaboration Users Passwords Microsoft Office Cloud Computing Apps IT Services Employer-Employee Relationship Windows 10 Bandwidth Save Money Automation Business Continuity Holiday Quick Tips Phishing Managed IT Services Office Facebook Marketing Data Backup Internet of Things Chrome Gadgets IT Support Gmail Saving Money Mobile Device Management Data Recovery Networking Wi-Fi Server Disaster Recovery Wireless Managed Service Health Router Alert Information Applications Password Apple Remote Computing Managed Service Provider Computers Settings VPN Access Control Retail Data Breach Hacking Virtualization App Business Intelligence Mobility Office Tips Cybercrime Government Data Management Law Enforcement Analytics iPhone BYOD Application Office 365 Remote Monitoring Patch Management Blockchain Website Going Green Operating System BDR Recovery Twitter Covid-19 Laptop Excel Physical Security Mobile Computing Workers Maintenance Safety Compliance VoIP Remote Work Paperless Office Managed IT Service Lithium-ion battery Politics Entertainment Spam Voice over Internet Protocol WiFi Telephone Systems Big Data Biometrics Value Artificial Intelligence Battery History Mouse Virus Bring Your Own Device Social Engineering Conferencing Word Printer Environment Humor Google Drive eWaste Processor Hybrid Cloud Managing Stress Healthcare Company Culture Cost Management User Error Sports G Suite Net Neutrality Best Practice Data Security Virtual Reality Business Technology Information Technology Vulnerability Shortcut Tablet Social Network Cortana Medical IT Scam Telephony Connectivity Smart Technology Mobile Office Batteries Human Resources Cleaning Files Meetings DDoS Robot Tech Support IT solutions Data storage Hard Drives End of Support Payment Cards Customer Relationship Management Telephone System PowerPoint Shadow IT Current Events Search Risk Management Customer Service Wireless Charging Dark Web Internet Exlporer Hosted Solution Windows 7 Education Streaming Media Fax Server Tip of the week Remote Monitoring and Management The Internet of Things Content Filtering Two-factor Authentication Virtual Assistant RAM Data Protection How To Printer Server HIPAA Tech Terms Employee-Employer Relationship Managed IT Backup and Disaster Recovery IT Telecommuting Troubleshooting Email Management Printing Remote Working Hard Drive Science Electronic Health Records Relocation Managed Services Provider User Security Windows XP Network Attached Storage SSD Display PDF Hosted Desktop Millennials Update Paper Video Games Processors Windows 8 Licensing Server Management Employees Vendor Reporting Gadget Wearable Technology Inventory Benchmarks Social Firewall Phone System Outlook Ink Travel Cables PCI DSS Spyware User E-Commerce Black Market Machine Learning Solid State Drive Bloatware Webcam People Running Cable Mobile Security Recycling Profiles Profitability YouTube Live Streaming Worker Uninterrupted Power Supply Alerts Regulations Compliance HP Payment Telecommute Hard Disk Drive Entrepreneur Distribution Sales GDPR disposal e-waste Social Networking Computer Repair Voice over IP Eliminating Downtime NarrowBand Multi-Factor Security Downloads WhatsApp Work/Life Balance Document Management Bluetooth instant Messaging Downtime Tablets Data loss Video Fleet Management Knowledge Storage Avoiding Downtime Automobile Bitcoin IT Service eCommerce Wireless Internet Wireless Technology Trends News Amazon Digital USB Vulnerabilities Staff OneNote Multi-Factor Authentication Comparison Error Copy Distributed Denial of Service Mobile Online Shopping Help Desk Chromecast A.I. Plug-In Access Budget Edge Cryptocurrency Monitor Memory Websites Windows Server 2008 R2 Internet exploMicrosoft Holidays Specifications Touchscreen Paste Database Antivirus Threats Techology Remote Consultant Certification Computer Accessories Movies Proactive IT Printers Reputation Dongle Taskbar Advertising Programming Virtual Private Network Microsoft Office 365 Tactics Google Maps Scams HaaS Remote Workers Lead Generation Best Available Training Cameras Unified Communications Remote Support Hiring/Firing Spotify IT budget Time Management Customer SharePoint National Security Private Cloud Co-Managed IT Authentication Remote Control Internet Explorer Personal Information Encryption Project Management Flexibility Security Cameras Analyitcs Analysis Staffing Cabling IT Management Chrome OS Technology Tips Updates Public Cloud Memes User Tip WIndows 7 Authorization Spam Blocking Unified Threat Management Threat Botnet SaaS Notifications Insurance Legal Management WannaCry Wearables Touchpad Hacker Microsoft Teams File Management File Sharing Windows Media Player