Just recently, Marriot Hotels announced that they were affected by a data breach and over 500 million hotel guests had their data exposed. It is much easier to trick someone into giving a password than it is to brute force or guess it. It’s much easier to trick someone into doing something they shouldn’t than to compromise a system and write code. The present technology is capable of combating a lot of threats and does a decent job filtering out a lot of noise. However, the last line of defense is always people– that’s you.
Below are some quick tips for identifying scams. This is not an exhaustive list but meant to be a quick refresher.
At the end of the day-use common sense and ask yourself if you should do something. Does it make sense for your job? Are you expecting something? Can you reach out to the person via a method other than email? What is the worst that happens if you DON’T open the email or follow the link?
Frequently Asked Questions:
“Hey Nick, those are pretty generic tips– how do I actually do those things?”
How do I check the sending email address?
When you open an email message in Microsoft Outlook (either using the Reading Pane or not) the first information displayed in the upper left-hand corner will display the sender’s name and the sender’s address.
In the example below the Sender’s Name is highlighted in yellow and the Sender’s Email is circled in red.
How do I check the URL in the browser?
The most important part of the URL to quickly review is the Domain Name.
Examples of Scams
Example 1: Fake link using someone I know
The email below arrived in my Junk mail and was intended to look like my sister-in-law wanted me to check something out. The scammer used her name (1), likely pulled from my list of friends on Facebook with some other email (2) they either owned or compromised. The body of the message was nothing more than an attempt to get me to follow a link to check something out (3). The link (4) was obfuscated and pretty random looking. I would never follow this.
Example 2: Fake link using false pretense from known service
The email below arrived in my Junk mail and was intended to look like I received a DocuSign document. My first thought was “I am not expecting a document, thus I do not care”. Additionally, you can see that the Display Name (1) was set to look like it came from DocuSign, but the Email Address (2) was certainly not a DocuSign address because it came from “@jeffhartmd.com”, which was likely a compromised account. Further, you can see that there is a link to “See Invoice” (3) but if I hover over the link to look at the actual URL it is most certainly not DocuSign (4).
Example 3: Fake site to harvest credentials
The example below is a replication of the Office 365 login page. By examining the URL in this image you can clearly see that it is NOT https://login.microsoft.com but instead a clever fake to fool you into entering your Office 365 credentials.
A couple of important things to note here:
Check out other MatrixCare articles on phishing to learn more helpful tips:
‘Phishing – It’s A Jungle Out There!’ https://www.matrixcare.com/blog/phishing-its-a-jungle-out-there/
‘What’s the Difference Between a Terrible Password and a Great Password?’ https://www.matrixcare.com/blog/terrible-password-vs-great-password/
Request a demo today for a closer look at MatrixCare.
Senior Director, Information Technology at MatrixCare
Start by having a call with one of our experts to see our platform in action.
MatrixCare offers industry-leading software solutions. Thousands of facility-based and home-based care organizations trust us to help them improve efficiency and provide exceptional care.
© 2024 MatrixCare is a registered trademark of MatrixCare. All rights reserved.