Blog Post

Catching the Big Phish

Eberly Systems

We're all in the same boat trying to avoid cybercrime

Phishing is something that everyone deals with today. According to the 2023 Internet Crime Report, phishing is the number one crime reported. Even with the modern protections against phishing, it is important for users to know how to spot these attempts. 

 

Below are our main pointers for identifying a potential phish:


Beware the sense of urgency 


It’s important to understand the common phishing tactics. The main goal of a phishing email is to trick victims into clicking a link or giving information and the main tactic of a common phishing email is using a sense of urgency. For example, an email may claim you missed a payment, and your account will be terminated if you don’t pay within the next 24 hours. This is a major red flag and is most likely a phishing threat.   


Look for grammatical mistakes 


Most phishing emails will include small grammar mistakes or spelling errors. Legitimate email messages from companies are written by professionals, so detecting errors is a good flag that the email could be malicious. You should also look for strange sounding phrases that might have been run through a translator. 


Requests for personal information 


Most scam emails are designed to look real, but legitimate companies will never ask for you to send personal information over email. If an email ever asks for any sensitive information, this is most likely a phishing attempt. If you believe the email could be real, contact the company directly to confirm its legitimacy. 


Look at the sender 


An email may seem like it comes from a reputable company, but a closer look may reveal some inconsistencies. If an address contains a long string of letters or numbers, it’s likely a malicious email. Also check the end of the address for foreign domains like “.ru” or “.in” which means the email was send from Russia or India, respectively.   


Double check hyperlinks 


Most phishing emails will contain a suspicious link, which is a giveaway that the email is illegitimate. One way to check if the link is malicious is to hover your cursor over the link. This will reveal the real link and if both links do not match, the email is most likely malicious. You can also check for spelling errors in the link.   


Suspicious attachments 


A malicious email might contain an attachment. Pause before you open any attachment, because they could be malicious files that download a virus to your device. Always double check the email to ensure its legitimacy before opening attachments. 


Report phishing emails 


If you believe you have received a phishing email, send a report to your system administrator. At Eberly Systems, we utilize Catch Phish - a software that enables users to easily report phishing emails for further analysis. 

 


Stay vigilant. Stay safe! Choose Eberly Systems to help you be the best line of defense against cybercrime.   


By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers
By Eberly Systems July 9, 2024
Keeping you abreast of security news
By Eberly Systems May 2, 2024
West Lawn, PA, May 2, 2024 — Eberly Systems , the West Lawn-based managed IT services and managed voice provider, today announces its acquisition of the Lebanon-based LYLAB Technology Solutions. Eberly Systems seeks to further a movement of people who are motivated and equipped to make a difference in their world through their daily work. They believe in building lasting partnerships based on trust and transparency while delivering industry-leading solutions to support and protect critical business assets. Driven by the principles of people, excellence, integrity, and stewardship, the team prides itself on partnering with companies to securely, reliably, and efficiently grow their businesses. “We cannot be more excited to join forces with the LYLAB team,” comments Kordel Eberly, Eberly Systems President & Founder. “ The integration of LYLAB Technology Solutions into Eberly Systems solidifies our commitment to providing small businesses with unparalleled service and support. We’re proud of this new opportunity to carefully design and manage the IT infrastructure and systems of even more local businesses and communities.” The acquisition solidifies the Eberly Systems commitment to supporting businesses in Lebanon County. Merging the two teams together as one entity offers the collective team the benefit of enhancing capabilities, refining processes, and extending reach to better serve the evolving needs of small businesses in the surrounding area. Future plans include expanding their presence into Lancaster County.
computer help with IT support
By Eberly Systems January 16, 2024
A trusted MSP can be your invaluable strategic partner.
By Eberly Systems January 2, 2024
These 5 key features of Office 365 Business Premium make it essential for businesses to have.
set of keys
By Eberly Systems December 19, 2023
Eberly Systems has been hard at work over the last year in a concerted effort to enhance the security posture of our clients’ information technology environments. Here are the quarterly updates.
construction site
By Eberly Systems July 3, 2023
After years of steady growth, the workforce at a construction development and property management company was becoming increasingly frustrated by disorganized data. Eberly Systems deployed a hybrid cloud storage solution for efficiency and secure data access.
By Nate M. June 1, 2023
SharePoint file storage has both features and limitations that you should be aware of while storing and accessing files. Here's a rundown.
By Nate M. January 5, 2023
These are the Eberly Systems recommendations for creating good passwords in 2023.
By Eberly Systems December 15, 2022
Every business relies on phones and a phone service. In accordance with Eberly Services Managed IT, we offer Managed Voice solutions for both handheld and softphones supported by our stellar sales and help desk teams.
More Posts
Share by: