How Can We Help You?

General Docs

How to Spot a Phishing Email

Estimated reading: 5 minutes

As the first person who reads and interacts with their email, you are the first line of defense your organization has against phishing emails. Phishing emails are scams that can cause serious damage to computer networks by introducing malware, stealing important credentials, and exposing your organization to breaches of private data. Learning how to spot and handle these emails can help maintain data security for you and your organization. Here is a quick Top Ten list for how to detect and deal with a phishing email.

1. Don't trust the sender.


Always look at the email address to confirm the true sender. Phishing emails will often be sent from an email address that looks similar or nearly identical to a trusted source but have a misspelling or a different domain name. Emails can also fake the “from” address, so make sure to expand the sender’s name to show where the email is really from.


It turns out that Jan is not actually the Boss.

Look for these types of notices at the top of your email.

2. Look don't click.


Hover your mouse pointer over links without clicking. If the alt text looks strange or doesn't match the link description, don't click on it. Don’t automatically trust shortened links (i.e., bit.ly).


The actual URL may also appear at the bottom left of your screen when hovering.

3. Check for spelling errors.


Phishing emails often contain more spelling and grammatical errors than an email from a trusted source. The spacing or layout of the email may also look disorganized or awkward to read. Look out for strange characters like “ⱱᴼ१©⋲ℳᾀἾḶ”.


I'm going to guess that they aren't actually our freinds friends.

4. Consider the greeting.


Generic or unfamiliar greetings are common in phishing emails. Check to see if the sender addresses you directly and if the greeting lines up with your organization's typical style of correspondence.


Not only is the greeting vague, but what does "out of limits" mean? That account better be back by 10pm!

5. Be wary of requests for personal or sensitive information.


Legitimate organizations and businesses have protocols for collecting and sending sensitive data (such as passwords, bank information, and even contact information) and are very unlikely to ask you to send them via email. Login credentials are sensitive information and should never be sent over email or text message.


The above email has at least 5 red flags, but if the email isn't read carefully, it's easy to miss them.

6. Beware of urgency.


Be aware of emails that use a sense of urgency to inspire a call to action. If there is an emergency that requires your immediate transferring of money in your company or personal life, it's unlikely to be communicated in an email.


Scammers may also use threatening language to inspire an urgent call to action.

7. Check the email signature.


When verifying a sender, use contact information from previous a correspondence, company directory, or public listing. Scammers can edit signatures, though, so do not automatically trust the contact information in the email.


"Yours Truly, Bill Gates" would have been a more believable signature.

8. Be skeptical of attachments and links.


Scammers might try to trick you into opening an attachment or clicking a link to a file sharing site. Not expecting a file? Follow up with the sender via phone or in person and confirm they sent the email before you open any attachments.


The subject line says the message is 57 seconds, but the message says 27 seconds.
Nice try, "WIRELESS USER".

Warning

Be extremely cautious of file sharing sites that ask you for your Office 365 login information.

9. Stay up to date on the service your organization uses.


It's important to know what services your organization uses. Be cautions of emails from unfamiliar vendors or with links from services your organization doesn't use.


Sticks out when it's an email for a voicemail from "accounts payable invoices" and the truly impressive icon is a PDF. Points for covering their bases.

Advice

Dropbox has at least 5 legitimate email addresses it sends mail from. If your organization does not typically use Dropbox, the safest thing to do is contact the sender and verify their email.

10. When in doubt, reach out.


If the sender is someone you trust, contact them and verify they sent you the email. If the email is from someone you don't know or trust and it contains any of the red flags mentioned in this article, it's very likely a phishing email and you can report and delete it. If you're still unsure about the legitimacy of an email, please contact us and we can help you out.

Every time you open an email, make sure that you look out for these signs of a phishing email. Everyone who opens email at your organization should familiarize themselves, too. Look over the screen shots below for more examples of phishing emails.

Share this Doc

How to Spot a Phishing Email

Or copy link

CONTENTS