VIRTUALTEAM IT
  • HOME
  • SERVICES
    • IT Support & Outsourcing
    • Data Recovery
    • IT Security ​and Auditing
    • Websites Design and Hosting
  • PRODUCTS
    • SAAS, ​Cloud and Hosting
    • Perimeter Security ​and CCTV
    • Servers and Storage
    • Data Centers Infrastructure
    • Networks & Structured Cabling
    • Computers and Users
    • IT Solutions ​and Licenses
    • Information Security ​& Protection
  • CONTACT
    • Contact Us
    • ABOUT VT
    • Remote Support
  • Tech Blog

Learn to spot scam/spam

14/2/2018

0 Comments

 
What is Phishing?
Phishing attacks are email messages try to use social engineering and information gathering, so hackers use deception to manipulate you into providing confidential or personal information, and then use that information for fraudulent purposes. Phishing attacks usually come as email. Hackers pose as trustworthy people and organizations to trick you into giving them sensitive data like your username, password, social security number, or credit card information. And sometimes they can get these details by asking you to click a link to renew your account or download an invoice, but it will gather your information as soon as you click the link.
How can I tell if an email is a phishing attempt?
When you get an email that seems suspicious, follow these tips to avoid becoming a victim of phishing.
​
1. Look at the URL of any link included in an email. Phishing emails typically include a link. Scammers want you to click this link to gain access to your computer or access to your sensitive data. Beware! Hover over any link to see where it is taking you before you click. If you do not recognize the URL, do not click the link.
Picture

​2. 
Watch for poor spelling and grammar. Scammers have become very sophisticated. Many now use specialized translation tools; improper grammar and spelling are no longer a giveaway. Remember that official SIU emails are always spell-checked, and should be error-free.
Picture
​3. Beware of urgent or threatening language. Do not trust emails that say “your account has been suspended” or “verify your information.” Scammers use language like this to get your attention. You should also be aware of requests for financial aid documents, job offers, and email account information. 
Picture
4. Be suspicious! sometimes a hacker will use a name of a person you know to cover their sender email address, think about it, if it seems suspicious, always call the sender to confirm.
Phishing can happen anywhere, to anybody. When in doubt, don’t click any links in the scam email, and report it by calling or forwarding the message to someone who can help.

To check you phishing IQ, go to the links below:
https://www.sonicwall.com/en-us/phishing-iq-test
https://www.phishingbox.com/phishing-test
0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    ​
    Do you have an technology related  question or inquiry?
    Let us know on: 
    support@virtualteamit.com
    ​and we will post the answer here!

    Archives

    November 2019
    February 2018
    January 2018

    Categories

    All
    Email
    Security
    Smart Devices

    RSS Feed

Picture
Address
Fatima Bint Mubarak Street,
​Al Yasat Tower, Office 409
PO Box 44847, ​Abu Dhabi, UAE
Tel: +971 2 622 9692
Email: info@virtualteamit.com
Technology Products
  • Servers and ​Storage
  • Data Centers Infrastructure
  • Networks & Structured Cabling
  • Computers and Users
  • Perimeter Security ​and CCTV
  • Software Solutions ​and Licenses
  • SAAS, ​Cloud and Hosting
  • ​Information Security ​and Protection​
IT Support Services
  • IT Support and Outsourcing
  • Consultancy and Advisory
  • IT Security ​and Auditing
  • Websites Design and Hosting
  • Professional Data Recovery
  • Maintenance and Repair
  • Implementation and Migration
  • IT Project ​Management
Company
  • About Us
  • ​Contact
  • IT Knowledge base 
  • ​News Room
​© 2009-2020 Virtual Team IT, If any of our website resources violate your copyright, please contact us to remove them immediately!
  • HOME
  • SERVICES
    • IT Support & Outsourcing
    • Data Recovery
    • IT Security ​and Auditing
    • Websites Design and Hosting
  • PRODUCTS
    • SAAS, ​Cloud and Hosting
    • Perimeter Security ​and CCTV
    • Servers and Storage
    • Data Centers Infrastructure
    • Networks & Structured Cabling
    • Computers and Users
    • IT Solutions ​and Licenses
    • Information Security ​& Protection
  • CONTACT
    • Contact Us
    • ABOUT VT
    • Remote Support
  • Tech Blog