Heart of Texas Network Consultants Blog

Can You Spot the Signs of a Malicious Link?

Can You Spot the Signs of a Malicious Link?

The Internet is notorious for being a minefield of threats, many of which lurk hidden behind innocent-looking links. In order to go about business safely, you need to be able to identify which links you can click; and, which should be skipped.

Unfortunately, spotting fraudulent links isn’t an exact science, but there are ways to become proficient at the art of it.

Trust No One...
...or at least, trust no one’s links. It is exceptionally common for malicious links to be shared through emails or social media messages. In your email client, an easy check is to select the option to view the full header of the message. This will allow you to view the sender’s full email address, as well as the reply-to address, enabling you to judge if the sender is legitimate.

If it just so happens that one of your regular contacts has sent you a link without any context, it is better to reach out to them through some other means to confirm that they did, in fact, send you the mysterious link. Similar actions can take place over social media accounts. Less security-savvy contacts can easily have their accounts hijacked to spread a malicious link, and so you should always be careful of messages that come without warning -- even if you know and trust the apparent source.

Sometimes, an attacker will create a clone of someone’s social media account to try and trick their target into accepting friendship. While this may seem initially harmless, keep in mind that the person behind the account now has access to a running record of your activities.

Further Defenses
It is also important to remember that the attackers that use these messages are becoming much more convincing. Many of these phishing attempts will draw upon data stolen from other breaches or drawn from any online accounts to make their attempts more convincing.

Your best defense against links like these is to hover your cursor over the questionable content to see if the link matches what it should. In addition to these practices, you should also keep an eye out for egregious misspellings in the surrounding message, as these are an excellent sign of a malicious attack.

Google Makes Its Move
Google has adopted a policy of flagging any website that doesn’t have a Secure Sockets Layer, or SSL, certificate. This means that, in order to avoid your website displaying with a prominent “Not Secure” in the address bar, you need to obtain a certificate as quickly as possible. Not only will this encourage a sense of trust from your web visitors, it will encrypt their sensitive information and keep them safe from cybercriminals.

Now that you know how to identify malicious links like these, you should call Heart of Texas Network Consultants so that we can stop as many as we can. Call (254) 848-7100 for more information.

FREE Printout: Dos and Don’ts of IT Security
Tip of the Week: Is Spam Ruining Your Email?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, June 18 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Outsourced IT Smartphones Hosted Solutions Antivirus Business Management Customer Relationship Management Password Cybercrime communications Vulnerability Technology Productivity Money Smartphone Network Internet of Things Mobile Devices Business Continuity Education Spam VPN Apps IT Support Windows 10 Encryption Facebook App Mobile Device Management Ransomware Mobile Office Going Green Best Practices Telephone Systems VoIP Mobile Device Operating System Cost Management Microsoft Office Information Alert USB Wireless Hardware Maintenance Office 365 Data Backup Chrome BDR Update Google Drive Hackers Cloud Computing Users Marketing Miscellaneous Software Bring Your Own Device Vendor Management Automation Upgrade Phishing Cybersecurity Artificial Intelligence Law Enforcement Best Practice Quick Tips Shortcut Microsoft Gmail Wireless Technology WiFi Security IT Services Tip of the Week Browser Social Networking Business Computing Computer Tech Support Virtualization Proactive IT Mobility Mobile Computing Malware Health Two-factor Authentication Big Data Productivity OneNote User Error Windows Managed IT Services Government User Tips Application Remote Computing Small Business Gadgets Unsupported Software Innovation Avoiding Downtime Wi-Fi Search Collaboration Printer PowerPoint Internet Social Media Applications Server Efficiency Privacy iPhone Risk Management IT Support Augmented Reality BYOD Managed Service Provider Retail Hacking Workplace Tips Android Data Lithium-ion battery Employer-Employee Relationship Humor Holiday Cloud Data Management Office Bandwidth Communication Saving Money The Internet of Things Tech Term Networking Tablet Unified Threat Management Social Google Router Managed IT Services Windows 8 Laptop Information Technology Windows 10 Network Security Save Money Hard Drives Data Security Office Tips Passwords Disaster Recovery Backup Business Current Events Computers Data Recovery History Email