5 ways to spot phishing scams

Updated: Apr 27

BY Annabelle Graham


Phishing is one of the most common tactics cyber criminals use to steal people’s data and infect their devices with malware. It uses deceptive emails and websites to trick victims into clicking malicious links, downloading attachments or sending sensitive information. 


Phishing emails can impersonate well-known brands or even people you know, such as colleagues. The goal is to trick the recipient into believing that the message is important and convince them to click a malicious link/attachment or provide sensitive data such as banking details and passwords.  


As cyber criminals’ techniques continue to develop, it gets harder to spot their scams. Almost half of all phishing emails are opened, and with attacks costing mid-sized organisations €1.4 million ($1,569,750.00 US dollars) on average, everyone needs to make email security a priority.


In this blog, we provide five clues to help you detect phishing emails.


1. THE EMAIL IS SENT FROM A PUBLIC EMAIL ADDRESS


Look at the sender’s email address, as this can help identify if the person is truly who they claim to be. Often, the criminal will use a public email address such as gmail.com. If your bank or colleague is going to email you, it will come from a company email account with the company name in the email address. 


2. STRANGE ATTACHMENTS


If you receive an unexpected email or an email from someone you don’t know asking you to open an attachment, do not open it. These attachments can contain malware that can harm your computer and capture your personal data. 


3. THE CREATION OF A SENSE OF URGENCY 


Phishing emails often ask recipients to verify personal information, such as bank details or a password. They can create a sense of urgency by warning that your account has experienced suspicious activity or pretending to be someone you know who is in urgent need of financial help. 


These are massive warning signs. If you are ever unsure, contact the company or person using the contact details you already have for them or that are on their legitimate website. Never use any contact details or click any links provided in the email. 


4. LINKS TO UNRECOGNIZED SITES OR URLS THAT MISSPELL A FAMILIAR DOMAIN NAME


Phishing emails may ask you to click a link within the email. By hovering your mouse over the link or address, you can see the linked site’s true URL. These URLs can be slightly misspelled or completely different to what you are expecting, so always double check before you click. 


5. POOR SPELLING AND GRAMMAR


You can often detect a phishing email by the way it is written. The writing style might be different to that usually used by the sender and it might contain spelling mistakes and poor grammar. 


One of the reasons behind the large increase in phishing attacks is the lack of basic knowledge about them. People are fundamental to cyber security, so it is vital that they can detect security threats and know how to respond.


PREVENT PHISHING ATTACKS IN YOUR ORGANIZATION


This blog shows that, as tricky as cyber criminals are, there are always clues that can help you stay safe. The hard part is memorizing them so that you can spot a suspicious email before it’s too late.


Organizations that want to help their employees navigate these issues should consider an online training course, it is the perfect introduction to phishing, providing a crash course in email-based threats. You and your staff will gain an understanding of what phishing is, how it works and what to look for in just a few minutes.


_____________________________

Original Article posted here:


Davison, Burton, Flint, Fenton, Beecher, Flushing, Grand Blanc, Swartz Creek, Linden, Mount Morris, Clio, Argentine, Genesee, Michigan, Cyber Liability

329 N State Rd, Davison, MI 48423

(810) 653-2602

  • Grey Facebook Icon
  • Grey Google Places Icon

CA License: 0G47886

We use cookies to personalize and enhance your experience on our site.  Visit our Privacy Policy to learn more. By using our site, you agree to our use of cookies, as well as our Privacy Policy and Terms of Use.