Call (716) 373-4467
  1. The URL does not match the link provided or is not a recognizable website. Hover over all links prior to clicking on them.
  2. Don’t trust the name listed right after the From: – Check the actual email address.
  3. The message contains poor spelling and grammar.
  4. Analyze the greeting – Is it vague or personalized?
  5. The message asks for personal information – A reputable company will never ask for your password, credit card number, social security number, or the answer to a security question via email.
  6. The email includes an attachment but no message.
  7. The offer is too good to be true or you didn’t initiate the action – You can’t win if you never entered the contest.
  8. You’re asked to send any kind of money upfront
  9. The email includes urgent or threatening language
  10. It just doesn’t look right – Listen to your gut and reach out to the sender through another medium.

Databranch offers end-user security trainings for organizations of all sizes. If you are interested in setting one up for your company, please reach out to Amanda at 716-373-4467 x 15 or alasky@databranch.com.

2FA AI APC backup business continuity BYOD client of the month cloud computing computer services computer support computer upgrade Computer Upgrades Control Chief covid-19 CryptoLocker CryptoWall Cyber Attacks cyber criminal cyberattack cybercrime cybersecurity Cybersecurity Training Dark Web Monitoring Dark web scan data protection Data-Loss Prevention Databranch Databranch Comprehensive Care databranch cto databranch employees Discounts dura-bilt email migration email security End of Support Exchange Online Facebook Hardware Refresh heat-induced server crash holiday computer tips holiday internet tips How Long Do I have to Upgrade my Windows 7 Computers? ID Agent Information Technology Internet Security IT Outsourcing IT Services J.P. Morgan malware managed service managed services Microsoft Microsoft End of Support Microsoft Patching Microsoft Support Microsoft Telephone Scam mike wilson mobile device security Multi-Factor Authentication Network Infrastructure Office 2013 Office 365 old UPS password management password security Penn-Troy Manufacturing Phishing Attacks Power Failure proper server environment Ransomware remote access SBS2011 security security vulnerabilty Server 2008 Server 2008R2 Server Upgrade server virtualization Small Business Small Business Server 2011 smb SMS intercept Social Media stolen credentials Symantec Symantec Backup Exec temperature Tips Two-Factor Authentication Upgrading to Windows 10 UPS virus Western New York Windows 10 Windows 7 Windows Server 2003 Windows Server 2012 winrar