<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">

OUR BLOG

How to Identify a Phishing Email

Posted by Gabrielle D'Andrea on Jun 5, 2018 10:00:00 AM

Before you open that very legitimate-looking email, I just want you to pause a second. If you don’t know already, phishing is an attack via e-mail that aims to gather your personal information. Whether it be passwords, account numbers, pins or social security numbers– you do not want that information in the wrong hands. The goal of this email is to look legitimate enough that you don’t see any concern in opening it. Over the years, people have become more savvy in spotting suspicious emails, but as we get smarter, so do hackers.

phishing attackes_Fairdinkum Consulting

So let’s say you get an urgent email in your inbox, claiming to be your bank… What do you look for?

1. Who is the Sender?

You open your inbox and you have an email from your bank with an urgent message. It looks legitimate, but beware of both how you are addressed and the subject of the email. Odds are, your bank knows your name, so if you are addressed generally, maybe take a step back and look at the email before you click on any links that may be harmful. If the subject line claims it’s urgent and sounds like something your bank wouldn’t normally say, it probably is a scam.

Phishing Email Cybersecurity Training Fairdinkum

2. URL

You click on the link and it brings you to a banking site. This hacker took a lot of time to make this website so authentic, you would have no idea it’s fake. But look again. Do you see “https” before the URL? If you don’t, get out of there and delete that email. If the website is secure it will have a security certification beforehand in your search bar.

phishing attackes global_Fairdinkum Consulting

3. What are they asking for?

Take your time. The goal of a hacker phishing to get your information is to fluster you and prompt you to fill out a form requiring sensitive information. The subject line might have inclined you to be worried, but just take a moment. Before you fill out any form, really analyze the situation. If something doesn’t feel right, go with your gut.

4. Grammar

So simple, yet so easy to mess up. Did your bank spell your name wrong, or perhaps use incorrect punctuation? Stop right there! These hackers are computer wizards not English majors, so do not fall for it.

schedule a time to talk_Fairdinkum Consulting 

Related Articles:

Data Breaches: Weak Configuration

The Anatomy of an Email Attack

Criteria for Evaluating EMM/MDM Solutions

 

Topics: Cyber Security, Security Training and Awareness, Network Safety, Phishing