(608) 755-1524 sales@computer-center.com
Even if you are on the right track, you’ll get run over if you just sit there.
Will Rodgers

IT Security Tip #6: How to Spot a Phishing Email

A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular website or to click and download a virus.

Often these e-mails look 100% legitimate and show up in the form of a PDF (scanned document) or a UPS or FedEx tracking number, bank letter, Facebook alert, bank notification, etc. That’s what makes these so dangerous – they LOOK exactly like a legitimate e-mail. So how can you tell a phishing e-mail from a legitimate one? Here are a few telltale signs.

First, hover over the URL in the e-mail (but DON’T CLICK!) to see the ACTUAL website you’ll be directed to. If there’s a mismatched or suspicious URL, delete the e-mail immediately. In fact, it’s a good practice to just go to the site direct (typing it into your browser) rather than clicking on the link to get to a particular site. Another telltale sign is poor grammar and spelling errors. Another warning sign is that the e-mail is asking you to “verify” or “validate” your login or asking for personal information. Why would your bank need you to verify your account number? They should already have that information. And finally, if the offer seems too good to be true, it probably is.d in cloud apps as well!

Microsoft Teams: Streamline Access With Custom Tabs

Create custom tabs to give your teammates easy access to the files, tools, and sites they use every day.

Select + on the menu at the top of your chat or channel to add a tab. They’ll be visible to all your teammates instantly.

Keyboard Keys

Shortcut of the Week

Use email rules and filters to control your email.

Use the Microsoft Outlook Rules Wizard (or filters through Yahoo! Mail or gmail) to help screen your emails and delete messages that are not important.

Examples of rules that can be set up

  1. Use keywords used in spam emails you frequently get (e.g., Viagra).
  2. Move emails from certain email addresses such as family and friends to a specific folder.
  3. Block web forwarded emails.

Happy Holidays!

From all of us at The Computer Center, Happy Holidays and best wishes for a very Happy New Year!

Have an unfortunate co-worker that’s not getting a copy of the TCC Tuesday Tidbits? Forward them your copy. Or, better yet, have them sign up at https://computer-center.com/tidbits/ Submit your TCC Tuesday Tidbit requests and ideas to me by calling (608) 755-1524. Sincerely, James Pearson, President The Computer Center 39 S. Main St. – Upper Janesville, WI 53545 (608) 755-1524