Your employees will hopefully be aware of and on the lookout for phishing emails, one of the most common types of cyber fraud. However, as organisations and their employees become more security savvy, hackers are adapting their strategies to create more convincing scams.
Phishing attacks are getting increasingly harder to spot, often taking advantage of current issues and concerns such as the COVID-19 pandemic, and have seen a sharp rise over the past few years. Cyber security firm F5 Labs reported that phishing attempts increased by 220% in 2020.
So, why are phishing emails so common? Well, they’re an easy win for cyber criminals – they take very little effort to create and enough people still fall for them.
The idea of a phishing attack is simple. A hacker will send out an email disguised as a genuine message from an organisation to thousands of random email addresses, in the hope that a few people will open the malicious link it contains or follow the email’s requests (such as entering login details). These emails can be very convincing at first glance, but there are usually some simple ways to spot if it’s a scam. Here are our telltale signs of a phishing attack.
1. You have no account with that company
If you get a message like, “Please update your PayPal account!” but you don’t even have an account with the company, that’s a pretty big red flag.
While you might pause to think, “What if someone opened an account in my name?” you still don’t want to open this email. Go directly to the company in question and request help.
2. The email account isn’t connected to the company
What if you do have a PayPal account, but it isn’t connected to the email account where you received the message? If you’ve never told the company about your other email account, it shouldn’t send emails to that account.
It’s that simple. Delete!
3. The return email address isn’t normal
This is one of the easiest ones to overlook, but one of the most surefire ways to spot a bogus email.
If you get an email from a known company, the email should come directly from that company. If it’s a bill from Netflix, it should come from something like [email protected]
If there are extra letters or numbers in the return email address, it is not legit. Even if there is a minor error like [email protected], it’s a trick.
4. The email asks you to confirm personal information
You’ve probably heard this before, but let it sink in – reputable companies will never request personal information like your Social Security number, account numbers or account PINs via email.
Even if everything else in the email looks legit, this is a giant red flag. Never click a link from an email you weren’t expecting and provide personal information. Ever.
5. The email is poorly written
Typos happen. That’s not exactly what we’re talking about here. We’re talking about consistently missed words or poorly phrased sentences, which are clear signs a non-native English speaker wrote the email.
Reputable companies don’t let that happen. They have editors and proofreaders who verify their emails look professional before they’re sent out.
6. There is a suspicious attachment
Attachments are pretty common, so we don’t worry about them too much, but we should.
If you see an email with an unexpected attachment, be suspicious. Most reputable companies will ask you to download assets from their website and will not send you an attachment.
7. The message is super urgent
A favourite tactic of phishing scams is to put the pressure on right away. The email may claim you have missed a payment, owe the government money or have been recorded through your laptop’s camera.
These tactics are intended to make you panic and rush to respond to the situation, which means you’ll click on their links to get to the bottom of it. Boom. You’re a phish on the hook!
Don’t respond to high-pressure emails unless you know the reason it appeared. Even if you’re late on your credit card payment and receive a nastygram from your credit card company, don’t use a link from that email to pay or put in information. Go directly to the website.
8. The email doesn’t use your name in the greeting
Does this look familiar? “Dear valued customer” or “Greetings, friend.” Yeah, this is a dead giveaway that an email isn’t from a source you know or work with regularly.
Any company you have an account with should know your name and use it in emails. That’s standard stuff. If you’re not greeted by name, the sender doesn’t know you, and you probably don’t know them (and don’t want to).
9. The whole email is a hyperlink
If your cursor turns into the pointing hand no matter where it is on the email, the entire email is one giant hyperlink. Why? If the whole email is a hyperlink, any random mouse click delivers the sender’s virus or malware.
Why wait for you to open an attachment if the hacker can get you with any click? This one is fairly easy to spot and a dead giveaway.
10. The email is from a public domain
If you get an email claiming to be from a business you know and trust, but the sender’s email address is from a public domain like @gmail.com or @outlook.com, this is another red flag.
Businesses that frequently send out emails have their own domain names, and all emails should come from that domain. If Jill is claiming to be from Verizon, but her email is [email protected], you know it’s at least spam but very likely a phishing attempt.
What should you do if you’re not sure?
If you get a puzzling email, pause before doing anything with it. Go over this list and look for clues. If you’re still not sure, the best thing you can do is contact the company in question directly, not through that email.
Go directly to the company’s website or call the company and explain what you saw in the email.
It’s possible you’ll alert the company of a fraud scheme it is unaware of. You may also learn the email is legit. Either way, by contacting the company directly, you’ve avoided the unnecessary risk from a phishing attack.
How do I report a phishing email?
Keeping a watchful eye on your inbox and reporting suspicious emails is your best bet to fight back against phishing.
Some parts of this article are sourced from: