How to spot a phishing email
It’s the perfect time for hackers to send e-mails with dangerous malware and viruses. Right now, your inbox is probably filled with “COVID-19” subject lines and coronavirus-focused e-mails.
Hackers are even using a fake cdc-gov e-mail address that’s not legitimate and spamming inboxes.
How can you tell a phishing e-mail from a legitimate one? Here’s a few telltale signs on how-to spot a phishing email:
- Look closely at the e-mail address to make sure it’s spelled correctly.
- Hover over any links in the e-mail (but DON’T CLICK) to see the ACTUAL website you’ll be directed to. If there’s a mismatched or suspicious URL, delete the e-mail immediately.
- Watch for poor grammar and spelling errors.
- Never download an attachment unless you know who sent it and what it is.
When in doubt, call the person who supposedly sent the e-mail on the phone to verify it’s legitimate.
Want more tips for setting up safe Work From Home networks? Check out our free report if you liked our tips on how-to spot a phishing email. Or book a free 15 minute work from home security consultation.
What You Need to Know about Google Tracking Your Location
Google is tracking the whereabouts of billions of its customers, even when they tell the tech giant not to. Here is what you need to know about this practice, including how to minimize the amount of data being stored about you.
4 Upcoming IT Trends Businesses Need to Know About
As we look toward 2020, there are some very interesting IT trends that will affect the way businesses operate. Let’s take a look at 4…
VoIP Phone Systems
Your regular office phone system could be preventing your small business from growing. If you're not using a VoIP Phone system right now, you’re probably tied down to an office desk phone, costly monthly phone bills, and other expenses that come with a company landline and cell phone. What if there was a simple solution...
Have You Considered Device-as-a-Service?
This past year has brought with it many changes and many learnings. The word “transformation” has become one of the most used, or some would…
Preparing for Compliance to the Modernization of Privacy Laws in Canada
With all the different legislation either already enacted or being enacted in different jurisdictions, organizations may find it difficult to determine what they need to…