How to Spot a Phishing Email
A phishing attack typically starts with an email that claims to be from a legitimate website, such as a banking or online store websites. Cyber criminals trick users into revealing their private information by making them believe that the message is something they want or need.
This increasingly popular form of cyber-crime poses a very real threat to organizations as well as individuals around the world. Even though the tactic seems simple, the key behind phishing success is catching people who are unaware of what a phishing attack looks like.
In today’s world, cyber criminals often find it easier to attack users rather than attack software. If a cyber-criminal can convince a user to email their credentials, or download a file, then there is no need to go through all the effort of cracking encryption algorithms.
Fortunately, a little information can go a long way when protecting users and their data. The best way to protect against phishing attacks is user education. Here are some ways to spot a phishing attack:
- The email asks you to confirm personal information: Phishing emails often ask you to either reply or personal data or enter them on a website.
- The message is designed to make you panic: Urgency and scare tactics are a psychological way to manipulate users into lowering their guard so they respond quickly without thinking.
- The web and email addresses do not look genuine: Legitimate organizations will not contact you from an address that is sent from a public email domain. It is important to always check the addresses the email came from.
- There’s a suspicious attachment: It is advised to never open an attachment unless you are fully confident that the message is from a legitimate party. Legitimate companies will not send attachments that are unsolicited – especially IP files. Opening attachments are cyber criminal’s #1 choice for spreading malicious software.
- It is poorly written: Users can often point out a scam if it contains poor spelling and grammar.
- Hover to discover:Mouse over links in the email to reveal their true URL (DO NOT click the link). If the name and URL do not match, delete the email.
The Tech Zen offers a range of services to solve your technology troubles. Each of our technicians has over 10 years of experience in servicing both PC and Apple environments. We can address your internet security concerns, provide data backup solutions, and offer ongoing support for your office to provide peace of mind. Contact us to find out how we can help.
Trackbacks & Pingbacks
[…] there now that’s not legitimate and is spamming inboxes across the country. See our article on How To Spot a Phishing Email for additional […]
Comments are closed.