Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Identify If an Email is a Security Risk

How to Identify If an Email is a Security Risk

There’s one major reason why email is the preferred method of spreading threats like ransomware and other types of malicious software. The sheer number of messages that can be sent through email on its own increases the odds that a user will click on the wrong link or download the wrong attachment. How can you know the legitimacy of any message you receive in your email inbox?

It all starts by being aware of the issue at hand and staying vigilant of any potential threats. You should actively look for reasons not to click on links in suspicious emails. You can never be too careful, especially when there is so much on the line. Here are three warning signs that you can look for to avoid a malware attack via email.

Spelling and Grammar Errors
Nobody has perfect spelling and grammar, and it’s forgivable if they make a mistake here or there, but when an email is filled with errors that make it hard to believe its authenticity, perhaps you’re staring a red flag in the face. Professional messages will at least contain passable grammar that makes them easy to understand, but a malicious message might be filled with all sorts of nonsense that urges you to click on a link or download an attachment. Sometimes you might encounter a phishing email that’s very discreet, but this is more of an exception than the norm.

Links Leading to Suspicious or Unfamiliar Targets
Let’s say that you receive a message from your bank. When you hover over a link in the message, it shows that the link doesn’t lead to any site you’re familiar with. This is a clear indicator that you might be looking at a very well-orchestrated phishing scam. Before clicking on any link, just hover your cursor over it without clicking on it. In a bar at the bottom of your browser, you’ll see the target of the link. If it looks suspicious, you can easily disregard it or report it to IT.

Messages from Unknown Senders
Who did you receive the message from? If you know who sent the message, then perhaps the message is legitimate. However, it’s easy for hackers to spoof an email address and make it appear that someone else is sending a message. Remember, suspicion is better than falling into a trap. In a worst-case scenario, even a CEO or upper-level employee could have their account spoofed in a phishing or whaling scheme. If you suspect that this has happened, notify your IT department immediately so that measures can be taken against these efforts.

Thankfully, with a little bit of thought and caution, you can avoid most fraudulent emails, but it would be nicer if you didn’t have to worry about seeing these messages in the first place. An enterprise-level spam filter can keep fraudulent and spam messages at bay. To learn more, reach out to us at 217-475-0226.

Tip of the Week: Which Headphones are Right for Yo...
Making the Switch from Apple to Android? Be Prepar...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 25 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Network Security Hackers IT Support Business Computing Android Cybersecurity Tech Term Google Smartphone Business Management Malware User Tips Internet Software Backup Email Small Business Managed IT Services Ransomware Data Innovation Data Recovery Productivity Artificial Intelligence Windows 10 Phishing Communications Cost Management IT Management Business Cloud Cybercrime Data Backup Efficiency Business Technology Mobile Device Management Collaboration Patch Management Hard Drive Network Update Managed IT Services Computer Saving Money App Hardware Outsourced IT IT Services Blockchain Data Security Gadgets Encryption Antivirus Word Microsoft Document Management Start Menu Law Enforcement Digital Passwords Browser Data loss Hacking Scam Websites Laptop Mobile Device Data Management Data Breach Office 365 Smartphones Disaster Recovery Applications Tech Terms Business Continuity Data Protection Project Management BDR Access Control Alert Internet of Things Automation Bitcoin Apps Social Engineering Windows VPN Gmail Server Operating System SaaS Vulnerabilities Facebook Maintenance Money Remote Monitoring Search Bandwidth Social Media Touchscreen Save Money Microsoft Office Holiday Spam Unified Threat Management HTML Cortana Going Green Outlook Virtualization Business Cards Identity Theft News Disaster Conferencing Vendor Mangement Running Cable Virtual Assistant Download Google Docs Solid State Drive WiFi Apple Access Business Mangement Desktop Fake News Telephone Systems Chromebook Unified Communications Cabling IT Support Devices Upload Budget Redundancy Wireless Emails Spyware Downtime Knowledge Consultant Backup and Disaster Recovery Printing Software as a Service Compliance Tablet Hard Drive Disposal Trends Specifications Uninterrupted Power Supply Bluetooth Analytics Piracy Microsoft Excel Government Worker Regulations How to email scam Gamification Software License Television Comparison Wireless Headphones Printer Google Drive Mobile Security Cryptocurrency Legal Cloud Computing Virus Samsung Accountants Mobile Devices Mouse History Managed Service Provider Unified Threat Management Cleaning Big Data Paperless Office Telephony Two-factor Authentication Google Maps Downloads Training YouTube eWaste Content Information Technology IBM Emergency Computers Database VoIP Automobile Multi-factor Authentication Hosted Solutions VoIp Equifax Settings Robot Mobile Technology Vulnerability Best Practice Nanotechnology Tactics Device security Excel Audit Employer-Employee Relationship Mobility Startup Administration Augmented Reality SharePoint DDoS Unsupported Software Addiction Time Management Website Corporate Profile Tip of the week Network Management Managed IT Computing Infrastructure Virtual Reality Distributed Denial of Service Screen Reader Password Machine Learning Service Level Agreement Computer Care Google Calendar Legislation Networking Company Culture Freedom of Information Upgrades Communication Windows 10 Marketing Twitter Managing Stress BYOD Office Users Multi-Factor Security Office Tips CrashOverride

Latest Blog

IT support is one of the most important parts of any modern business simply because it’s just not feasible to run a business without any form of technology at its core. For example, most businesses rely on email and other forms of communication, whereas stores might require ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.