Cyber Security Tip: How to spot a phishing e-mail

Cyber Security Tip: How to spot a phishing e-mail

Aug 8, 2023

A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular website or to click and download a virus.

Often these e-mails look 100% legitimate and show up in the form of a PDF (scanned document) or a UPS or FedEx tracking number, bank letter, Facebook alert, bank notification, etc. That’s what makes these so dangerous – they LOOK exactly like a legitimate e-mail. So, how can you tell a phishing e-mail from a legitimate one? Here are a few telltale signs…

First, double-check the e-mail. You might discover that the e-mail from the boss is actually from a Gmail account and not the company e-mail.

Second, hover over the URL in the e-mail (but DON’T CLICK!) to see the ACTUAL website you’ll be directed to. If there’s a mismatched or suspicious URL, delete the e-mail immediately.

If you’re unsure, simply go directly to the site (typing it into your browser) rather than clicking on the link. Another telltale sign is poor grammar and spelling errors.

Have questions about cyber security or some other IT-related issues? Book Now to book a quick, 10-minute session, or call 480-999-5468 to speak to someone now.

Related Posts

Cyber Security Tip: The #1 threat to your security is…

Cyber Security Tip: The #1 threat to your security is…

IT Security Tip #22:

YOU! And your employees. Like it or not, human beings are our own worst enemies online, inviting hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken every day online. In most cases, this is done without malicious intent – but if you as a manager or owner aren’t monitoring what websites your employees are visiting, what files they’re sending and receiving, and even what they’re posting in company e-mail, you could be opening yourself up to a world of hurt.

Cyber Security Tip: 3 essential rules for all cloud applications

Cyber Security Tip: 3 essential rules for all cloud applications

IT Security Tip #21:

If you’re using any kind of cloud application (and these days, who isn’t?), you are right to be concerned about data privacy and security. The company hosting your data is ultimately responsible for keeping hackers out of THEIR network, but most cloud breaches are due to USER ERROR. So, it’s important that you, the user, are being smart about security. Here are a few things you can easily do to improve security in the cloud:

0 Comments