Tech Watch Magazine - Russell Quinn Issue 8 | Page 15

Here Is The S. E. C. U. R. E. Method You And Your Employees Can Use To Help Identify Phishing E-Mails.
S – Start With The Subject Line: Is it odd?( e. g.,“ FWD: FWD: FWD: review immediately”)
E – Examine The E-mail Address: Do you recognize the person? Is the e-mail address unusual?( e. g., spelled differently) or unknown( not the one they usually send from)?
C – Consider The Greeting: Is the salutation unusual or generic?( e. g.,“ Hello Ma’ am!”)
U – Unpack The Message: Is there extreme urgency to get you to click a link or download an attachment or act on a too-good-to-be-true offer?
R – Review For Errors: Are there grammatical mistakes or odd misspellings?
E – Evaluate Links And Attachments: Hover over links before you click them to check the address, and do not open attachments from anyone you don’ t know or weren’ t expecting to receive mail from.
It’ s also important to have a cybersecurity expert monitor your network and eliminate e-mail spam before your employees can make a mistake. Make sure you’ re taking proper precautions to protect your network. These phishing attacks work and happen all the time. We don’ t want YOU to be the next victim.
Russell Quinn is Founder & CEO of Quinn Technology Solutions. They are based in Houston Metro Area. To find out more about what they do and how they could help you, please visit quinn-tech. com

Protect Your Business From Cyber ThreAts

with Russell Quinn
Cyber threats, regulatory fines, and costly scams are more relentless than ever. The Cyber Playbook provides expert strategies to protect data, streamline compliance, and stay secure.
Cutting-edge tactics to outsmart hackers Insights from top cybersecurity experts Practical steps to prevent costly breaches
Don’ t Wait!
Your Business’ s Future Depends On It! quinn-tech. com / calendar
15