Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    10 Tips for Identifying and Dealing With Phishing Email

    By
    Chris Preimesberger
    -
    October 18, 2016
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      110 Tips for Identifying and Dealing With Phishing Email

      1 - 10 Tips for Identifying and Dealing With Phishing Email

      Most people don’t question the “from” field in the emails they receive. We explain why they should and offer other guidelines for dealing with phishing email.

      2Don’t Trust the Display Name

      2 - Don't Trust the Display Name

      A favorite phishing tactic among cyber-criminals is to spoof the display name of an email. Here’s how it works: If a fraudster wanted to impersonate the hypothetical brand “My Bank,” the email may look something like the image here. Since My Bank doesn’t own the domain “secure.com,” email authentication defenses will not block this email on My Bank’s behalf. Once delivered, the email appears legitimate because most user inboxes and mobile phones will only present the display name. Always check the email address of the sender in the header; if it looks suspicious, flag the email.

      3Don’t Always Trust the Sender’s Email Address

      3 - Don't Always Trust the Sender's Email Address

      Fraudsters not only spoof brands in the display name, but they also spoof brands in the sender’s email address, including the domain name. Keep in mind that just because the sender’s email address looks legitimate (such as sendername@yourcompany.com), it may not be. A familiar name in your inbox isn’t always who you think it is.

      4Look but Don’t Click

      4 - Look but Don't Click

      Cyber-criminals love to embed malicious links in legitimate-sounding copy. Hover your mouse over any links you find embedded in the body of your email. If the link address looks weird, don’t click on it. If you have any reservations about the link, send the email directly to your security team.

      5Check for Spelling Mistakes

      5 - Check for Spelling Mistakes

      Brands are pretty serious about email. Legitimate messages usually do not have major spelling mistakes or poor grammar. Read your emails carefully and report anything that seems suspicious.

      6Analyze the Salutation

      6 - Analyze the Salutation

      Is the email addressed to a vague “Valued Customer?” If so, watch out; legitimate businesses will often use a personal salutation with your first and last name.

      7Watch What Information You Reveal

      7 - Watch What Information You Reveal

      Most companies will never ask for personal credentials via email, especially banks. Likewise, most companies will have policies preventing external communications of business IP. Stop yourself before revealing any confidential information over email.

      8Look at the Language in the Subject Line

      8 - Look at the Language in the Subject Line

      Invoking a sense of urgency or fear is a common phishing tactic. Beware of subject lines that claim your “account has been suspended” or ask you to take action on an “urgent payment request.”

      9Review the Signature

      9 - Review the Signature

      Lack of details about the signer or how you can contact a company strongly suggests a phishing attempt. Typically, legitimate businesses provide contact details. Check for them.

      10Be Cautious About Clicking on Attachments

      10 - Be Cautious About Clicking on Attachments

      Including malicious attachments that contain viruses and malware is a common phishing tactic. Malware can damage files on your computer, steal your passwords or spy on you without your knowledge. Don’t open any email attachments you weren’t expecting.

      11Don’t Believe Everything You See

      11 - Don't Believe Everything You See

      Phishers are extremely good at what they do. Many malicious emails include convincing brand logos, language and a seemingly valid email address. Be skeptical when it comes to your email messages; if it looks even remotely suspicious, do not open it.

      PrevNext
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×