EMAIL PHISHING

Criminals send phishing emails that appear to come from valid sources in an attempt to trick you into revealing personal and financial information.

WHAT TO LOOK FOR?

PHISHING IS HARD TO SPOT...

Spoofed Sender Address
Always check the sender's email
and if it comes from the correct domain
Sense of Urgency
Think twice if the subject
pushes you to act quickly
Suspicious Date and Time
Check when the email was sent and
be suspicious if it was sent
after working hours
Misleading and Invalid Link
NEVER click the links in an email,
ONLY click if you are totally sure
it comes from a trusty sender
Spoofed Signature
The signature can be easily spoofed,
so don't trust the email just because of it

9 Tips to spot phishing scams

 

TIP 1: Look for messages with many spelling errors and visual mistakes.

If the text contains many errors, you should be careful. Also, look at the websites you are guided to and note whether the displayed menu actually works or if it generates error messages.

TIP 2: Be wary of giving away sensitive data.

Whenever you are prompted to divulge personal data in order to update or verify a supposed account, you should be especially careful. Never enter personal or business username and password information on websites which were opened via a link in an email - unless you know its exact background and it corresponds to your company policy.

TIP 3: Beware when senders act trustworthy and confidential.

Even if you have received the email from your best friend, you should always remember that the message could be corrupt. Therefore, you should always be cautious. This also applies to emails from official organizations such as banks, tax authorities, online stores, travel agencies, airlines, etc. Even emails from your own employer are sometimes infected. Unfortunately, it is not so difficult to create imposter, phishing emails which appear identical to the real messages sent by legitimate organizations.

TIP 4: Do not automatically trust a well-designed website even if it appears exactly as the original.

Sometimes the phishing emails and websites look just like the real ones. It depends on how well the phisher has done his “homework.” The links, however, are likely to be wrong, contain misspellings or lead to completely different pages (such as www.paypaul.com instead of www.paypal.com). If the page to be visited is a well-known site which you visit frequently, you can manually type the page address in your browser instead of clicking on the link.

TIP 5: Beware, if you do not know the sender of the email.

If possible, do not open any emails from unknown senders. If you do, do not click any links contained in the message or at least move your mouse over the link to reveal the real target destination. Often the recipient copy ledger (cc:…) shows the email is being sent to numerous other recipients.

TIP 6: Be especially careful when the email is not appropriately addressed or contains awkward language.

Be suspicious of emails which open with a generic greeting (such as using the non-personalized salutation To Whom It May Concern) or an inconsistent style (such as colleagues who previously addressed you on a first name basis are now using last names only). The same applies to messages that are suddenly written in a language different from the usual one.

TIP 7: Mistrust emails prompting you for a quick action.

Emails that call for an immediate reaction (such as, prompting for an immediate login to an account) convey a sense of importance and are typical of phishing attacks. A clear warning is when there is a hint in the email that the data must be entered within a short time period.

TIP 8: Be very careful regarding any email attachments.

Files (for example, programs or even office documents) you receive via email may contain lethal malware. So remain cautious and only open emails that you expect and trust.

TIP 9: Be aware of who you contact in the organization if the accident is out

Keep in mind that when you click on a suspicious email, it is important that you contact our Service Desk immediately, for further analysis. Remember you are the main defense against a phishing attack.