Blog Layout

Sent. Delivered. Scammed. Protecting Yourself From Email Phishing

Paul Daigle • March 15, 2022

At one point in our lives, we receive a short, sweet email with the click-bait words “You’ve gotta see this,” or “You won’t believe what you did the other night.”

It might be an email with just a link and no explanation whatsoever. And we are all human, which means we are prone to acting on curiosity in the hopes of reward. When we click on the link, somebody gets rewarded alright – it’s just not us. 


Email phishing is one of the big ways hackers can steal your data. From passwords to bank account information, one lucky hacker can have it all if you simply click on a link or image. You on the other hand are gifted the stress and despair of recovering said information, resetting all of your passwords, debating monetary charges, and so on and so forth. Your side of the exchange is about as fair as your house getting robbed. 

 

But how were you to know that email was a scam? How were you to know it was a phishing attack? How were you to know your friend or coworker was hacked, and the perpetrator was continuing their spree with you? 



No one is invincible to hacks or phishing scams. NexTech Solutions’ security team states, “It is not whether you will receive some sort of attack; it’s really a matter of when. And when you receive one, you need to be prepared on what to do next.” Thankfully, most email systems are programmed to detect suspicious emails and links and send them straight to the Junk box, where they are never opened unless specifically sought out. Some suspicious emails still spill through to your inbox though, and in this blog, we will give you some tips on how to keep yourself from getting your information stolen. 


We often hear the phrase “Don’t click” when referring to suspicious webpages and links, and this advice is one of the most fundamental principles of cybersecurity. You can go a step further by taking the following actions: 


Hover – When met with an email claiming to be an official website with a hyperlinked button or image, hover your mouse over the image. The actual URL will appear in tiny scripting either right below the mouse or on the bottom left corner of your web browser, either matching or contrasting from the larger hyperlink. While the scripting may be a lot to read, doing so could be the first step to determining a link’s validity. Still, even if the script and hyperlink match, that doesn’t mean following the link is safe. For this reason, you’ll want to move onto the next steps. 


Look for the Top-Level Domain (TLD) – The end of a URL (where you find the “.com”) says a lot about the link’s legitimacy. If your URL ends in .gov, .org, or .edu, this means the site in question is either a government, nonprofit-organization, or educational resource, all of which are refutable and safe to visit. Meanwhile, beware of .com and .net, which stand for commercial and network resources respectively. These are the most common TLDs, and anyone with the right amount of cash can apply for one, including scammers. You should also watch out for custom TLDs, such as .macy or .train.


Customized domains have begun trending in the cyber world due to their cost efficiency in comparison to the more official TLDs (as read previously). That’s not to say the last three examples are always fraudulent (as you can see clearly from the URL, NexTech Solutions uses a .com TLD), but you should definitely be wary of phishing when sent an unknown address with any of these URL endings. 


Do Your Research – Humans don’t always appreciate feedback, especially if there’s a chance it will be negative; and honestly the Internet can be filled with so-called “haters”. But when confronted with an unknown site or suspicious email, web reviewers are a user’s best friend. Typically, if your email is a scam, you won’t be the first to have received one like it. Scams sort of trend in their own malicious way. Do a Google search. If there are reports online about others being subject to similar fraudulent emails via specific websites or addresses, chances are your emailed link in question is not safe to investigate. 


Verify by Other Means – Obviously, you wouldn’t reply to a suspect email with an unknown URL and address; but what if you’ve received a questionable link from one of your co-workers? Even employees in the technology industry can have their email and messaging accounts hacked. The best way to determine the validity of said email is to verify using another means. Suppose you get sent a link without any explanation or information from What’s-their-Name in a hypothetical department. The best way to quickly verify the information is to just ask them personally, either to their face, over the phone, or through another one of the messaging platforms they use. Our security team additionally states, “If it is work-related, always reach out to your IT Lead or your Security Team. Remember: If you see something, say something!” 


These steps are small and simple, and they take maybe a minute to accomplish; but if it means your data is safe from attackers, the precautions are worth the minimal time and effort. 


An advertisement for monkton x nts collaboration for mission solutions
January 6, 2025
[Tampa, FL] — NTS , a trusted leader in innovative technology products and expertly-managed solutions for defense and intelligence organizations, today announced a strategic partnership with Monkton , a pioneer in secure Edge-based mobility solutions. This collaboration underscores the commitment of both organizations to deliver advanced capabilities that streamline operations and accelerate mission success for government agencies and enterprises. Building upon the success of their flagship Edge Activation Platform, MANTLE , NTS has recently adapted their award winning automation technology for Android users. MANTLE Mobile offers efficient, user-focused configuration that simplifies complex setups, manages multiple devices simultaneously, and operates without external connectivity. Recognizing a shared foundation of lleveraging cutting-edge technology to meet the rapidly evolving needs of federal agencies, NTS aims to enhance its capabilities in providing secure, scalable, and compliant mobile solutions with Monkton’s industry-leading expertise in Edge-based mobility. Visit nextechsol.com/mantle to learn more about MANTLE Mobile. “ Partnering with Monkton allows NTS to extend our portfolio of secure mobility solutions and provide our customers with the tools they need to perform critical operations at the edge ,” said Biney Dhillon , Co-Founder and Executive Vice President of NTS. “ We are excited to collaborate with a company that shares our dedication to modernization and operational excellence. ” A leader in secure mobility, Monkton has delivered Edge-based solutions to civilian and enterprise organizations, government agencies, and the DoD since 2016. Founded on the notion of “ Building Faster Ways to Fix Things, ” Monkton rapidly develops and delivers compliant mobile solutions designed to streamline workflows and enhance operational efficiency wherever work is performed. With patented technology and security baked in from the start, Monkton products enable organizations to more securely capture, transmit, and receive critical data to meet missions faster. Visit monkton.io to learn more. Monkton’s industry-leading advancements for secure Edge Computing were recognized by the DoD in the issuance of our Phase III Small Business Innovation Research government- wide IDIQ in the form of the MATTER contract. MATTER, “Mobile Apps to The Tactical Edge Ready,” is a task-based IDIQ that was a sole source award to Monkton, Inc. MATTER supports secure, Edge-based mobility—enabling rapid acquisition to meet missions faster for any federal agency. Find out more at monkton.io/MATTER . The partnership between NTS and Monkton signals a new chapter in secure mobility, setting the stage for government agencies and enterprises to adopt transformative solutions that enhance efficiency and protect critical data in an increasingly complex digital landscape.
A man in a suit and white shirt is smiling in front of a red background ..
September 14, 2024
September 9, 2024 — NexTech Solutions (NTS) , a leading provider of innovative technology solutions, is proud to announce the appointment of David Pollman as the new Director of Counter-UAS (C-UAS) Operations. With an impressive career spanning over 18 years, Pollman brings a wealth of expertise and leadership to this critical role within the NTS organization. Before joining NTS, Pollman served as the Deputy Division Chief of Operations at the Joint Counter-UAS Office (JCO), where he played a pivotal role in overseeing and evaluating the implementation of the DoD’s C-UAS strategy. His dedication, expertise and leadership were key in advancing the understanding of UAS threats and fostering the development of innovative solutions. Pollman’s experience at JCO uniquely equips him to spearhead the C-UAS growth strategies at NTS and strengthens support efforts for U.S. government customers through the company’s comprehensive C-UAS portfolio. In addition to his work at JCO, Pollman’s distinguished career includes significant positions at Torch Technologies , DEFTEC Corporation , and the University of Arkansas – Fort Smith . He holds an MBA from L SU Shre veport and a bachelor’s degree in Technical Management from Embry-Riddle University . “We are excited to welcome David Pollman to NTS,” said NTS CEO, Joseph Paull . “Pollman’s extensive experience and deep understanding of counter-UAS operations will be invaluable as we continue to advance our solutions to support our government clients in addressing emerging UAS threats”, Paull continued. “David Pollman’s appointment underscores the commitment of NTS to enhancing its capabilities and maintaining leadership in mission solutions,” Paull concluded. About NTS For over 11 years, NexTech Solutions (NTS) has provided systems engineering, testing and evaluation, and operational support, integrating hardware, software, and subject matter experts to support U.S. Government missions. Our experts and engineers understand the challenges organizations face in finding and implementing the best defense technology solutions to meet their mission-critical objectives as the global tech landscape dynamically evolves. We proudly support the U nited States Depar tment of Defense and many other U.S. government customers around the world to determine the best solutions for exceeding mission objectives. To learn more about NTS, please visit our website NTS , or connect with us on LinkedIn , Facebook , and Instagram .
A black and red advertisement for nomad solutions
September 3, 2024
NexTech Solutions (NTS), a leading provider of innovative technology solutions, announces its acquisition of Nomad Solutions, a Virginia-based IT company specializing in government data and communication services. This strategic move strengthens the capabilities of NTS in supporting critical government infrastructure.
Nexttech solutions agrees to acquire rome research corporation
June 10, 2024
NexTech Solutions (NTS) has entered into an agreement to acquire 100% of the issued and outstanding shares of common stock of Rome Research Corporation (RRC), with an expected close by the end of Q2, 2024. NTS provides mission-focused solutions with cutting-edge technology, systems engineering, testing and evaluation, software, and subject matter experts to support U.S. DoD missions.
A black background with red circles and the word nts
April 1, 2024
NexTech Solutions (NTS), a leading provider of mission-centric cloud, data, and edge defense tech solutions for dozens of federal agencies, is thrilled to announce its platinum-level sponsorship of Skull Games, a 100% veteran-founded and operated 501(c)(3) non-profit organization dedicated to combating human trafficking throughout the United States.
A black and white poster for revolutionizing defense robotics
February 29, 2024
In recent years, advancements in technology have reshaped the landscape of military operations, with robotics emerging as a transformative force. From unmanned aerial vehicles (UAVs) to ground-based robots, the integration of robotics in the military has ushered in a new era of efficiency, precision, and adaptability on and off the battlefield.
A poster for a cyberspace symposium in colorado springs
February 18, 2024
Held at one of the most iconic resorts, The Broadmoor, in Colorado Springs, CO, this event brings together experts, professionals, and innovators from the cybersecurity realm to discuss and explore the latest trends, challenges, and solutions in the dynamic world of cyberspace.
a black background with red circles and the word nts on it
January 21, 2024
At NexTech Solutions (NTS), we are a team innovators, leaders, and trailblazers who thrive on challenging the status quo and are pioneering the next generation of government-focused solutions using our mission support platform as a service framework (we call it Technology Platform as a Service or T-PaaS).
a black background with red circles and the word nts on it
December 22, 2023
NexTech Solutions LLC (NTS), a leading software provider, is thrilled to announce its Edge Activation Platform (EAP) along with the official integration of its flagship product, MANTLE, into the Red Hat Embedded Partner Program.
A poster for the hire vets medallion program
November 15, 2023
NexTech Solutions Receives 2023 Hire Vets Medallion Award From the U.S. Department of Labor.
More Posts
Share by: