How to Spot a Phishing Email

Every business owner has seen it — that email that looks almost right. It could be a message from “your bank” asking you to confirm your credentials. It might be an invoice from a vendor that feels off. One wrong click can open the door to stolen passwords, ransomware, or data loss.

Knowing how to spot a phishing email could save your business thousands of dollars and days of downtime.

At SofTouch Systems, we help Texas businesses stay secure with managed IT services, password management, and 24/7 network monitoring. Here’s how to protect your inbox — and your bottom line.

How to Spot a Phishing Email

What Is a Phishing Email?

Phishing emails are digital bait. These messages are designed to trick you into sharing confidential information like passwords. They may also target your payment data or access credentials.
They often appear to come from trusted sources: your bank, a delivery company, or even someone inside your organization.

Attackers use these scams to steal login details or install malware. Once they’re in, they can move through your systems silently, stealing data or launching ransomware attacks.

Phishing remains one of the top causes of data breaches for small businesses — because it targets people, not systems.


Common Red Flags to Watch For

Here’s how to recognize a phishing email before it reaches your team’s inbox:

Red FlagWhat It MeansWhat You Should Do
Strange or unfamiliar senderThe name looks right, but the email address doesn’t match your contact’s domain (e.g., [email protected]).Hover over the sender’s address. If the domain looks odd, delete the message.
Urgent or threatening languagePhrases like “Your account will be closed today” or “Immediate payment required.”Pause. Legitimate organizations don’t threaten or rush you into action.
Suspicious links or attachmentsThe link text looks normal, but the URL preview shows a different address. Attachments are .zip, .exe, or .scr files.Don’t click or download. Access your account by typing the real web address manually.
Unexpected requests for credentials or moneyThe email asks you to log in, reset a password, or send funds to a “new” account.Never send passwords or money based on an email alone — confirm by phone or in person.
Generic greetings or poor formatting“Dear Customer,” misspellings, and odd phrasing are warning signs.Treat any unprofessional or impersonal message with caution.

Pro Tip: Hover before you click. If the link preview doesn’t match the sender or seems unrelated, it’s likely a trap.


How Phishing Has Changed

Phishing attacks have become more sophisticated and harder to detect:

  • AI-generated emails look grammatically perfect and can mimic your vendors or coworkers.
  • Business email compromise (BEC) attacks target company executives and accounting departments with believable requests.
  • Multi-channel phishing happens through texts, QR codes, or even phone calls pretending to be IT support.

Modern threats require modern awareness — training once a year isn’t enough.


Build a Human Firewall

Technology can block many threats, but your employees are the most important line of defense.
Here’s how to keep your team sharp and your systems secure:

  1. Train Regularly
    Conduct short, quarterly phishing-awareness refreshers. Realistic examples stick better than slideshows.
  2. Run Simulated Phishing Tests
    Send safe “fake” phishing emails to your staff. Track who clicks, who reports, and where training needs to improve.
  3. Establish a Reporting Process
    Make it easy for employees to forward suspicious messages to your IT team. Reward those who report attempts.
  4. Enforce Multi-Factor Authentication (MFA)
    Even if someone falls for a phishing email, MFA stops attackers from logging in with stolen passwords.
  5. Use Managed Security Services
    Partnering with a Managed Service Provider, such as SofTouch Systems, provides constant monitoring. It includes advanced email filtering. This partnership ensures a rapid response when something slips through.

SofTouch Systems Can Help

We don’t just tell you to be careful — we give you the tools and support to stay protected.

Our Cyber Essentials Lite bundle includes:

  • 1Password Business Integration – Protect every login with secure vaults and passkey support.
  • Bitdefender Managed Antivirus – Blocks infected attachments and links automatically.
  • 24/7 Network Monitoring – Flags suspicious behavior before it becomes a problem.
  • Phishing Simulation and Employee Training – Build awareness through experience, not guesswork.

And, because we believe in No-Surprise IT, all our packages come with transparent pricing, public SLAs, and predictable monthly costs.


Free Resource: “How to Spot a Phishing Email” Guide

We’ve created a free downloadable guide you can share with your team. It includes a one-page checklist. There are also real-world examples to help employees identify and report phishing emails confidently.

Download the Guide Here →

Keep it on your company intranet, share it during staff onboarding, or print copies for your office.


Final Thoughts

Phishing attacks aren’t going away — they’re getting smarter.
But with awareness, training, and the right security partner, your business can stay one step ahead.

If you’re ready to strengthen your team’s defenses, schedule a free 15-minute IT consultation with SofTouch Systems today. We’ll review your email security, phishing prevention measures, and staff readiness — at no cost.

How to Organize Shared Drives for Remote Teams


Remote and hybrid work can boost productivity. However, it can also bury teams under lost files, version chaos, and “Where did you save that?” messages.

A well-organized shared drive acts as your company’s digital headquarters. It keeps projects consistent, accessible, and secure no matter where your employees are.

In this guide, we’ll show you how to design a shared drive system. We will also explain how to maintain it. This system keeps your team aligned. It also ensures that your data is protected.

Shared Drives for Remote Teams: with SofTouch Systems

Step 1: Choose the Right Shared Platform

Start with a platform built for collaboration. The most common business-grade options include:

  • Google Drive for Business (Workspace)
  • Microsoft OneDrive / SharePoint
  • Dropbox Business
  • Box Enterprise

Pick a solution that integrates with your existing ecosystem (e.g., Google Workspace or Microsoft 365) to minimize friction.

Pro Tip: Avoid mixing multiple platforms (e.g., Drive + Dropbox). One centralized system = fewer sync issues and less confusion.


Step 2: Create a Consistent Folder Framework

Your shared drive structure should mirror your company operations — just like your local folders from Part 1.

Example structure:

/Shared Drive
/01 Administration
/02 Finance
/03 Operations
/04 Marketing & Sales
/05 Clients
/06 HR
/07 IT & Security

Pro Tip: Prefix folders with numbers to keep them sorted and consistent across devices.


Step 3: Use Team-Based Permissions

Not everyone needs access to everything.
Assign access based on role, not individual preference.

Suggested model:

  • Full Access: Leadership / IT
  • Edit Access: Department heads or project leads
  • View Only: Contractors, part-time staff, interns

Set permissions per top-level folder instead of every subfolder to reduce complexity.

Pro Tip: Use group permissions, like “Marketing Team,” instead of individuals. It’s easier to manage when people join or leave.


Step 4: Standardize Naming and Version Control

Confusion kills productivity.
Establish a clear naming format and stick to it:

Example:
YYYY-MM-DD_ProjectName_DocumentType_Version

Like:
2025-02-10_ClientA_Proposal_v3.docx

For version control:

  • Use cloud version history to roll back changes.
  • Never append “FINAL” to file names — that’s what version logs are for.
  • Encourage real-time editing in shared docs instead of emailed attachments.

Pro Tip: Create a 1-page “Naming Rules” document pinned to the top of your shared drive.


Step 5: Separate Active vs. Archived Projects

Keep your workspace lean by moving completed projects to an Archive folder.

Example:

/05 Clients
/Active
/Archive

Archive folders can be set to read-only, reducing clutter and accidental edits.

Pro Tip: Schedule quarterly cleanups where team leads review what to archive or delete.


Step 6: Protect and Monitor Your Data

Your shared drive is only as secure as its weakest password.

Enforce these habits:

  • MFA (multi-factor authentication) for all users.
  • Cloud-native data loss prevention (DLP) tools.
  • Audit sharing links every 90 days.
  • Encrypt offline backups of shared data.

Pro Tip: Managed IT services like SofTouch Systems can automate access reviews and detect unauthorized sharing activity.


Step 7: Document and Train

Even the best system fails if your team doesn’t know how to use it.
Create a short SOP (Standard Operating Procedure) explaining:

  • Folder structure overview
  • File naming rules
  • Access levels
  • Backup policy

Hold a 20-minute training session once a quarter to reinforce good habits.

Pro Tip: Record these trainings — new hires can rewatch anytime.


A clean, consistent shared drive builds trust, clarity, and accountability across your entire remote team.
By combining structure, automation, and security, your business can operate seamlessly. It can function smoothly whether your people are across the city or across the globe.

“Organization isn’t just efficiency — it’s peace of mind.”
SofTouch Systems, No-Surprise IT™


Ready to organize your shared drive for smoother teamwork?
SofTouch Systems can set up a secure, scalable shared structure for your remote or hybrid team.
Book your free 15-minute Shared Drive Audit today.

Use What Works: Why Not All Business Technology Needs Constant Upgrading

Black Friday and Cyber Monday always push the same message: buy the newest tech or fall behind. New TVs, printers, laptops, and “business bundles” flood every ad. Yet for most Texas businesses, this message causes overspending, unnecessary downtime, and real security gaps when rushed upgrades create more problems than they solve.

At SofTouch Systems, our stance is simple:
Use what works, update what matters, and upgrade only when it becomes unsafe, unstable, or too slow for your business. This approach gives you predictable costs, stronger security, and longer hardware lifespan, without getting trapped in hype-driven replacement cycles.

This philosophy reflects our “No-Surprise IT” commitment to honest, stable, security-first technology management for Central and South Texas businesses.

Not all business technology upgrades need to be every 1-2 years.
SofTouch Systems Predictable IT

Why You Don’t Need to Replace Hardware Every Year

A common belief is that technology becomes “outdated” after two or three years. That’s rarely true. Business-grade computers, servers, and networking gear can run reliably for 5–7 years with proper maintenance.

What matters is not age, it’s function, security, and performance.

A system is still good if it:

  • Runs a supported operating system
  • Receives security patches
  • Supports modern encryption and MFA
  • Performs efficiently for your team

Businesses lose thousands each year replacing equipment they don’t need to replace. Worse, rushed Black Friday purchases often skip the most important step: evaluating whether the device is still secure.

This is why our monitoring, antivirus, patching, and maintenance services exist, so your existing equipment stays safe and productive longer.


The Real Threat Isn’t Old Hardware — It’s Skipped Updates

The majority of breaches we investigate come from missing patches, outdated software, weak passwords, and unused security settings, not “old machines.”

Industry analysis consistently shows SMBs prioritize modernization through software, updates, network security, and cloud posture rather than constant hardware refreshes, because these deliver the highest protection and ROI.

Keeping systems updated and monitored is far more important than buying new ones. And that’s exactly where STS clients gain real value.


“When Should I Upgrade My “Device”?” – A Practical Business Evaluation Guide

To help businesses cut through the confusion, here’s a straightforward decision guide you can use for any device, computers, servers, switches, printers, firewalls, or Wi-Fi systems.

Later this month we will publish a free downloadable version of this framework titled:

“The STS Hardware Refresh Decision Guide”
(Available soon on our new Resource Center)

This guide will help Texas SMBs evaluate every part of their IT stack with clarity, no hype, no guesswork.

1. Security Support

Upgrade if:

  • The operating system is no longer supported
  • Firmware updates have stopped
  • Patches are unavailable

When security support ends, replacement becomes urgent.


2. Performance & Productivity

Upgrade if:

  • Employees are losing time waiting on slow machines
  • Apps crash or freeze during normal tasks
  • Boot times grow unreasonably long

If staff waste minutes per hour, the device is costing more than its replacement.


3. Compatibility

Upgrade if:

  • Key software stops supporting the device
  • Cloud platforms no longer run reliably
  • Modern encryption standards fail or errors appear

Outdated tech becomes a liability when it stops interfacing with what your business uses daily.


4. Repair Costs

Upgrade if:

  • You’ve repaired a device more than twice in one year
  • Parts are difficult to source
  • Labor costs exceed 40% of replacement cost

At that point, the machine is a money pit.


5. Business Growth

Upgrade if:

  • Your team has grown beyond what your current infrastructure can handle
  • Storage or processing needs have increased
  • Your network struggles with new cloud workflows

Scaling requires modern capacity.


Cyber Monday Deals for Business Owners

This year, we’re combining smart strategy with real savings. Instead of encouraging unnecessary tech purchases, STS is offering discounts on two tools that genuinely protect your digital footprint.


Surfshark VPN — Cyber Monday Deal

Protect your online traffic, remote workers, traveling staff, and sensitive business data.

SurfShark VPN

Surfshark VPN Cyber Monday

A VPN is one upgrade worth making because it strengthens privacy, stops ISP tracking, and shields business systems from risky networks.


Incogni — Cyber Monday Deal

Remove your business and personal data from data broker sites that fuel phishing and social-engineering attacks.

Incogni

Incogni Cyber Monday

Great for business owners, executives, HR, and anyone managing sensitive information.


STS Cyber Monday Offer: FREE Onboarding for Digital Essentials+

For Cyber Monday only, STS is offering free onboarding for any business that signs up for:

  • Digital Essentials
  • Cyber Essentials
  • Business+ Managed IT

This includes:

  • Employee onboarding
  • Device enrollment
  • Password manager setup
  • Antivirus installation
  • Patch management activation
  • Backup verification
  • Baseline security hardening

This alone saves a small business hundreds in setup costs and puts you on a secure, stable IT foundation from day one.

Learn more about our services here

SofTouch Systems Simplifying technology, maximizing results.

Why STS Recommends Smart Upgrades — Not Endless Spending

Your competitors often overspend on tech they don’t need. They chase new hardware while leaving gaping holes in updates, backups, passwords, and monitoring.

You don’t have to.

With “No-Surprise IT,” we prioritize:

  • Security
  • Stability
  • Predictability
  • Longevity
  • Cost control

And because our clients rely on us to guide these decisions, we make sure the right tools last as long as possible.