How You Can Prevent Phishing Attacks

Jul 2, 2018, 3:53 PM | Updated: Jan 22, 2020, 4:56 pm
Photo: Markus Spiske, Unsplash...
Photo: Markus Spiske, Unsplash

This article is sponsored by Les Olson Company, Your Office Technology Partner. Don’t let Phishing compromise your sensitive data and information. Get the expert technical support your business needs with Managed I.T. Services from Les Olson Company.

Chances are you’ve seen a phishing attempt in your email inbox in the last few days. It only takes a split second to be caught off guard by phishing emails, but the ramifications can last much longer. Here’s how can you prevent Phishing attacks on your computer and mobile devices.

I.T. Security

On this episode of I.T. Security, John Huston with the I.T. Services Department at Les Olson Company talks with host Ethan Millard about how to avoid phishing attacks. Phishing often happens through emails designed to trick you into providing personal information. If you think you’re too smart to fall for an email like this, you might be surprised. It’s not just the blatantly suspicious emails in broken English. These emails can look very legitimate, sometimes appearing to be from a bank, or some other organization you actually have dealings with. Don’t get tricked. Learn the signs that make an email “phishy”.

What is Phishing?

Phishing is an attempt to either gain and exploit your sensitive information or get you to click on a file or link containing malware or ransomware. Phishing usually happens through email, but can also be done through messaging apps, social media, and even the old fashioned way… the phone. These emails can be very sophisticated, using basic psychology to trick unsuspecting people into providing all kinds of information. While it can be quite easy to fall for these emails, there are some tell-tale signs that everyone should learn how to spot.

With 93% of Phishing emails also containing ransomware, this is a huge problem that you have to be diligent about.

What Can You Do About Phishing?

Photo: John Schnobrich, Unsplash

First, look who’s sending the email. Any email could potentially be a phishing attempt, and these emails can even appear to be from an individual or organization you personally know. It’s important to consider the context in these situations. Are you expecting to be contacted by this person? Do you have the type of relationship where they would send you files? It doesn’t hurt to be cautious and reply to their email asking them what the attachment is about.

You should also look out for creative misspellings; extra letters in email addresses or hyperlinks designed to dupe you. They are counting on your brain to simply overlook these slight differences in spelling. Additionally, if the subject line, name or greeting is generic, that is a great clue that this email wasn’t intended specifically for you. These bad actors like to cast a wide net, hoping someone will fall for their trickery. Be sure to avoid urgent email traps, in which the sender asks you to respond immediately. They are counting on you feeling the urge to act quickly and without thinking too much about it. Lastly, never provide ANY personal information through an email, over the phone, or on a website you’re directed to. A real financial institution, hospital, government agency, etc. will NEVER reach out to you asking for things like your account number or social security number. These are things they should already have if they are legitimately associated with you. Remember, when in doubt, simply pick up the phone and call the person or institution you’ve supposedly received the email from. It’s always better safe than sorry.

If You Fell for It

Les Olson Company offers proactive with training for organizations to educate their employees about specific threats such as suspicious emails, credential harvesting, password strength, and regulatory compliance with interactive training modules. Les Olson Company can even send simulated Phishing emails to your employees that emulate a range of phishing attack types to help you identify areas of weakness, and empower users through engaging training to strengthen your organization’s defenses. Contact Les Olson Company for a free vulnerability assessment.


KSL 5 TV Live

Top Stories


house with for rent sign posted...
Chase Harrington, president and COO of Entrata

Top 5 reasons you may want to consider apartment life over owning a home

There are many benefits of renting that can be overshadowed by the allure of buying a home. Here are five reasons why renting might be right for you.
13 days ago
Festive kitchen in Christmas decorations. Christmas dining room....
Lighting Design

6 Holiday Decor Trends to Try in 2022

We've rounded out the top 6 holiday decor trends for 2022 so you can be ahead of the game before you start shopping. 
23 days ago
Happy diverse college or university students are having fun on their graduation day...
BYU MBA at the Marriott School of Business

How to choose what MBA program is right for you: Take this quiz before you apply!

Wondering what MBA program is right for you? Take this quiz before you apply to see if it will help you meet your goals.
2 months ago
Diverse Group of Energetic Professionals Team Meeting in Modern Office: Brainstorming IT Programmer...
Les Olson

Don’t let a ransomware attack get you down | Protect your workplace today with cyber insurance

Business owners and operators should be on guard to protect their workplace. Cyber insurance can protect you from online attacks.
2 months ago
Hand turning a thermostat knob to increase savings by decreasing energy consumption. Composite imag...
Lighting Design

5 Lighting Tips to Save Energy and Money in Your Home

Advances in lighting technology make it easier to use smart features to cut costs. Read for tips to save energy by using different lighting strategies in your home.
2 months ago
Portrait of smiling practitioner with multi-ethnic senior people...
Summit Vista

How retirement communities help with healthy aging

There are many benefits that retirement communities contribute to healthy aging. Learn more about how it can enhance your life, or the life of your loved ones.
2 months ago
How You Can Prevent Phishing Attacks