RCS Professional Services Blog

RCS Professional Services has been serving the New York area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Identify If an Email is a Security Risk

How to Identify If an Email is a Security Risk

There’s one major reason why email is the preferred method of spreading threats like ransomware and other types of malicious software. The sheer number of messages that can be sent through email on its own increases the odds that a user will click on the wrong link or download the wrong attachment. How can you know the legitimacy of any message you receive in your email inbox?

It all starts by being aware of the issue at hand and staying vigilant of any potential threats. You should actively look for reasons not to click on links in suspicious emails. You can never be too careful, especially when there is so much on the line. Here are three warning signs that you can look for to avoid a malware attack via email.

Spelling and Grammar Errors
Nobody has perfect spelling and grammar, and it’s forgivable if they make a mistake here or there, but when an email is filled with errors that make it hard to believe its authenticity, perhaps you’re staring a red flag in the face. Professional messages will at least contain passable grammar that makes them easy to understand, but a malicious message might be filled with all sorts of nonsense that urges you to click on a link or download an attachment. Sometimes you might encounter a phishing email that’s very discreet, but this is more of an exception than the norm.

Links Leading to Suspicious or Unfamiliar Targets
Let’s say that you receive a message from your bank. When you hover over a link in the message, it shows that the link doesn’t lead to any site you’re familiar with. This is a clear indicator that you might be looking at a very well-orchestrated phishing scam. Before clicking on any link, just hover your cursor over it without clicking on it. In a bar at the bottom of your browser, you’ll see the target of the link. If it looks suspicious, you can easily disregard it or report it to IT.

Messages from Unknown Senders
Who did you receive the message from? If you know who sent the message, then perhaps the message is legitimate. However, it’s easy for hackers to spoof an email address and make it appear that someone else is sending a message. Remember, suspicion is better than falling into a trap. In a worst-case scenario, even a CEO or upper-level employee could have their account spoofed in a phishing or whaling scheme. If you suspect that this has happened, notify your IT department immediately so that measures can be taken against these efforts.

Thankfully, with a little bit of thought and caution, you can avoid most fraudulent emails, but it would be nicer if you didn’t have to worry about seeing these messages in the first place. An enterprise-level spam filter can keep fraudulent and spam messages at bay. To learn more, reach out to us at 212.532.9111.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 17 July 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Upcoming Events

No events

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Best Practices Technology microsoft Privacy Internet Software Tip of the Week Business Management workplace tips Tip of the Week Small Business Email gadgets Backup Mobile Office Hackers Managed Service Provider hardware Cloud Productivity Saving Money Quick Tips Google Malware Data Business COmputing Social Media Business Smartphones Mobile Devices Microsoft Office Android Users User Tips Computer Hosted Solutions Innovation Efficiency IT Services Virtualization Miscellaneous Passwords IT Support Business Continuity Smartphone Upgrade Windows WiFi Operating System Network Security VoIP Communication Disaster Recovery Holiday Apple Server Mobile Computing The Internet of Things Unified Threat Management Alert Marketing Mobile Device Management Facebook Ransomware Network Gmail Antivirus IT Support Windows 10 Analytics Windows 8 Apps Remote Computing Tech Term IT Consultant Outlook Content Filtering History Cybersecurity Health Data Management Hacking Collaboration Excel Vendor Management Phishing Remote Monitoring Browser Money Virus Artificial Intelligence Maintenance Search Data Recovery Big data Going Green communications Office Printer Tutorials Lithium-ion Battery Managed IT Services Productivity Firewall Current Events Mobile Device Humor Bandwidth Cybercrime Employer-Employee Relationship Windows 10 Data Backup Website App Bluetooth Chrome eWaste Wireless Technology Update Social Networking VPN Cost Management Office 365 Augmented Reality Spam PowerPoint Business Intelligence Proactive IT Avoiding Downtime Hard Drives Automation Managed IT Services Applications Word iPhone BDR Internet of Things Downtime Laptop BYOD Data Security Tech Support Best Practice Company Culture Networking Comparison Unified Communications Retail Blockchain Experience Computer Accessories Law Enforcement Education Tablet Lifestyle Project Management YouTube Cryptocurrency IT Management Mouse Customer Relationship Management Data loss Two-factor Authentication Cleaning Hiring/Firing Disaster Data storage Help Desk User Vulnerability Sports Save Time Google Docs Social Business Technology Safety Document Management Specifications Websites Scam SaaS DDoS Bring Your Own Device Data Breach Robot Government IBM Computers Net Neutrality User Error Pain Points Tech Terms Touchscreen Cortana Inbound Marketing USB Social Engineering Access Control Compliance Administration Computer Repair Presentation Gaming Console Vulnerabilities Wireless Running Cable Phone System Saving Time Patch Management Encryption Digital Payment Information Technology Bitcoin Save Money Distributed Denial of Service Domains Nanotechnology Printing Optimization Business Cards Digital Shortcut Charging HTML Twitter Troubleshooting Printer Server Screen Reader Downloads Programming Recycling Virtual Assistant Piracy Staffing Network Congestion Environment Competition Co-Managed IT Skype Emergency Streaming Media Memory Mobility Wearable Technology Computer Care GPS Conferencing Read Continuity Hard Drive Disposal Online Currency Software License Time Management Application Harddrive Travel Get More Done Devices Windows XP Google Calendar Training Society Business Owner 3D Webinar Backup and Disaster Recovery Solar Mobile Technology Unified Threat Management Recovery Legal Hackeres Product Reviews Regulations Virtual Desktop Television Display Google Maps Text Messaging Manages Service Provider Value Hiring/Firing Managing Stress Desktop Documents Trending Office Tips intranet Identity Theft Public Speaking Accountants Professional Services SharePoint Ebay Music Entertainment Fax Server Cables Software as a Service Securty Statistics Virtual Reality Heating/Cooling Analytic Trojan Equifax Knowledge Point of Sale Zero-Day Threat Freedom of Information Pirating Information Black Market External Harddrive Wires Deep Learning Chromebook Hacker LiFi Startup Media Streaming Dongle News Business Growth Password Smart Phones Voice over Internet Protocol Mobile Security Managed IT Monitors Entrepreneur Customer Service Visible Light Communication HIPAA Upselling Legislation Service Level Agreement Fake News email scam Start Menu Processors Debate Google Wallet Electronic Payment FinTech LinkedIn Multi-factor Authentication Displays Router Budget IP Address Advertising Emails Smart Office Microsoft Excel Data Protection Hosted Solution Teamwork MSP Phone Systems Device security End of Support File Sharing Hard Drive Storage Wireless Headphones Audit Work Computing Infrastructure Drones Leadership Development Redundancy Writing Keyboard