How to Know You Are the Victim of Email Phishing.

Have you ever received an email that looks just a little bit different than all the others? Or maybe you have recently received an email from a sender that looks out of the ordinary or that you are not familiar with. If this has happened to you, we at N-Tech Consulting suggest that you DO NOT proceed with clicking any links, replying, or any other action the email asks you to do. Our suggestion is to immediately contact us or your technology provider and follow their guidelines to ensure you and your technology ecosystem are protected.

In a previous post we discussed What is Email Phishing, to educate on a technique used heavily by cyber criminals to attempt to gain access to sensitive business information, passwords, and even credit card information. Not to be confused with actual fishing, a cyber criminal uses the same technique by putting out bait and seeing who will bite and fall into their trap. 

We at N-Tech want to make sure you are never lured into the trap of Email Phishing. In this post you will find early insight on how to detect if you are at risk to becoming the victim of an Email Phishing attack, and how to prevent these attacks from happening.


Below are questions to ask yourself if you feel you are the victim of an email phishing attempt.

Does the sender look suspicious, or is an address you don't recognize?

Many times a phishing attempt will replicate someone you have previously been in contact with via email, that is why is is very important that you check the actual domain of the sender, to further understand who is actually sending you that email.

EmailPhishingBlog_From

Does the subject line require an action or perceive as a threat to you?

It is important to pay close attention to what the subject line reads. If the subject line reads anything that may seem persuasive, demanding, or aggressive think twice about opening the email and taking action. This is especially true if the subject line reads something that you have no previous knowledge of. More times than none if your boss or supervisor wants to inform you of important information there will be some kind of precursor or they will tell you in person.

EmailPhishingBlog-Subject

Is the greeting generic and and not particular to you?

Typically someone who is attempting a phishing attack will send a multitude of emails out at one particular time. This strategy results in efficiency of time on the end of the phisher, but increases the likelihood of a victim from preforming action on the attack. There are also phishers who will personalize the greeting. If this is the case, refer to the other guidelines to determine a phishing attempt. 

EmailPhishingBlog-Greeting

Are there grammatical or spelling errors within the email?

With texting being a consistent form of communication comes the use of abbreviated grammar and acronyms. If you see within the copy of the email the usage of 'u', instead of 'you', or the word 'send', where the word 'sent' should be, then this should raise question as a potential phishing attempt. Other inconsistencies include extra spaces in between words, and the use of symbols to attempt a clickable action by you, the user.

Are there links within the email?

Before clicking any link within an email use this helpful tactic to justify the legitimacy of the link. Place your mouse cursor on top of the potential threatening link, (it is important to note NOT TO CLICK the link upon doing so). After holding the cursor on-top of the link for a few seconds, the actual destination of the URL will appear. If the destination of the URL is different than what is shown in the email, there is a great likelihood this is an attempt at phishing.

EmailPhishingBlog-Links

Is there an attachment that requires a download?

Does the suspicious email you just received have an attachment included, and you are eager to open it to see what it could potentially be? As tempting as it may be to open that attachment we at N-Tech urge you to hold off, as that attachment may house the vulnerable link within the attachment instead of the email body itself. 

EmailPhishingBlog-Attachments

Should I be worried about an email that looks branded by a reputable company as being a phishing attempt?

The answer is YES, you should absolutely be wary of branded emails, especially if it is a service that you may have never heard of before or are not a user of. If you are on the fence on if that branded email is legitimate or not, please refer to the above areas of emphasis to determine if you should proceed or not with that email. As always if you are unsure reach out to N-Tech or your technology provider.

To see a real life example of a phishing attempt that replicated an email from Netflix, visit What is Email Phishing and How Do I Prevent it?

EmailPhishingBlog-Images

Not sure if that email from your boss is legitimate or not? Well, press that shiny new button installed in your Outlook application to report it for review. Security awareness platforms like Ironscales (which happens to be the one we use) also provide IT staff the ability to launch their own fake phishing campaigns. These are designed to present end users with real-world examples, without the risk, of course, and can act as a method to direct them to train if needed.

What are the Advantages and Disadvantages of Using the Cloud?

The cloud is everywhere. That might seem intimidating, but everyone uses it at some point. You may not realize you are using it, but every time you update your Facebook or Twitter status, you’re using the cloud. Many people are beginning to believe that using the cloud is the future and some believe that the hype of it will soon fade. Companies of all sizes are beginning to follow the new trend of making the switch over to the cloud. So why are these companies making the switch? Just like any other form of technology, there are many advantages and disadvantages that come with it. Taking the time to understand the advantages and disadvantages of the cloud may help you decide if your company should make the switch.

Any place that has an internet connection can access the cloud. On top of being able to access it anywhere, you can access it on any type of mobile device at any time. This means businesses can allow employees to work anywhere. The cloud can even help save costs. Companies want to keep their expenses as low as possible. With the cloud, there is no in-house server storage and application requirements that have licensing fees. The cloud can have cheaper rates such as a one-time payment or pay as you go option. Having all of your data stored in the cloud makes backup and recovery much easier. Creating a second copy of files that can be stored remotely and then  accessed anywhere with internet connection is great if a disaster were to occur. Although everything sounds great, there are downsides when working in the cloud.

Even though the cloud is easily accessible, there is the possibility of having to deal with downtime. This means outages and technical issues may occur, which will lead to not being able to access any of your files. You may experience downtime because of the cloud service provider or if your internet were to go offline. One major concern people have is how secure the cloud is. Cloud service providers apply the best security, but it’s important to keep in mind that you do share important files to an external provider, which can be risky. Their security could end up being hacked and then your files could be stolen or deleted. Even if the provider tries to make sure everything is perfectly secure, it’s hard to be one hundred percent sure that they actually are.

Use of the cloud does not seem to be slowing down any time soon. Like everything else, there are advantages and disadvantages to using the cloud. Although there are concerns for possible downtime and how secure the cloud is, it can be accessed anywhere, save your company money, and it’s great for recovering files. If you have questions or are ready to get set up for the cloud, give us a call at (855) 711-6601 or email us at sales@ntech.io.

What is a Managed Services Provider?

Does your dental practice have a reliable IT Team? Or maybe you are looking for a new IT Team..

What is a Managed Services Provider?

N-Tech's Managed Services is designed to, implement, and support your IT at every turn — we have you covered. Our Managed Services partnerships cover everything you need to ensure your technology works how you need it to, when you need it, and with no surprises.

Why is a Managed Services Provider Important?

1. Flexible Options

Better business outcomes is our main goal here at N-Tech Consulting. We understand that every dental practice is unique in regards to their technology. Creating a better experience both for your patients and internal staff is top priority here at N-Tech.

2. Accessibility to Information Technology Professionals

With over 25+ years of IT Experience our Managed Services engineers are ready at hand with any and all tasks thrown their way. No task is too big or too small to solution. 

3. Rapid Response Support Time

With an IT Systems Engineer always on call we pride ourselves with any issue that may occur at any time of the day 24/7.

4. Partner Focused

N-Tech's Managed Services offering is guaranteed to allow you to focus on your business. Hiring N-Tech as your Managed Services Provider ensures you will receive the best advice and support from our experienced team.


What can you expect with Managed Services through N-Tech Consulting?

Forward Communication

Focusing on solving technology issues because your number one priority is your business. Our team of technology experts are dedicated to making your IT experience as seamless as possible.

Proactive Management

Preventative measures to ensure your business is firing on all cylinders at all times. Proactive management makes sure we get to the problem before it gets to you.

Security Essentials

Focusing on operating systems, software patching and malicious software scanning and removal, this precautionary feature focuses on stopping problems before they reach your business.

Partner Onboarding

The first step in implementing our services. We’ll get to know your business, plan for long-term decisions and understand not only where you are but where you are going. Our partner onboarding typically consists of five phases. 


Do you question why you and your practice spends multiple hours a week resolving IT issues within the office? Are you looking for a solution to these recurring issues and are looking to have a Tech Assessment done? If your answer is yes, schedule a meeting with one of our sales consultants to see how we can be your primary Managed Services Provider.