Tutorials

10 quick tips for identifying phishing emails

Avoid falling victim to a phishing attack with these easy tips

Hacker behind screen

Your employees will hopefully be aware of and on the lookout for phishing emails, one of the most common types of cyber fraud. However, as organisations and their employees become more security savvy, hackers are adapting their strategies to create more convincing scams. 

Phishing attacks are getting increasingly harder to spot, often taking advantage of current issues and concerns such as the COVID-19 pandemic, and have seen a sharp rise over the past few years. Cyber security firm F5 Labs reported that phishing attempts increased by 220% in 2020.

So, why are phishing emails so common? Well, they’re an easy win for cyber criminals – they take very little effort to create and enough people still fall for them.

The idea of a phishing attack is simple. A hacker will send out an email disguised as a genuine message from an organisation to thousands of random email addresses, in the hope that a few people will open the malicious link it contains or follow the email's requests (such as entering login details). These emails can be very convincing at first glance, but there are usually some simple ways to spot if it’s a scam. Here are our telltale signs of a phishing attack.  

1. You have no account with that company

If you get a message like, “Please update your PayPal account!” but you don’t even have an account with the company, that’s a pretty big red flag. 

While you might pause to think, “What if someone opened an account in my name?” you still don’t want to open this email. Go directly to the company in question and request help.

2. The email account isn’t connected to the company

What if you do have a PayPal account, but it isn’t connected to the email account where you received the message? If you’ve never told the company about your other email account, it shouldn’t send emails to that account. 

It’s that simple. Delete!

3. The return email address isn’t normal

This is one of the easiest ones to overlook, but one of the most surefire ways to spot a bogus email. 

If you get an email from a known company, the email should come directly from that company. If it’s a bill from Netflix, it should come from something like billing@netflix.com. 

Related Resource

Email security threat report 2020

Four key trends from spear fishing to credentials theft

Download now

If there are extra letters or numbers in the return email address, it is not legit. Even if there is a minor error like billing@netflex.com, it’s a trick.

4. The email asks you to confirm personal information

You’ve probably heard this before, but let it sink in - reputable companies will never request personal information like your Social Security number, account numbers or account PINs via email. 

Even if everything else in the email looks legit, this is a giant red flag. Never click a link from an email you weren’t expecting and provide personal information. Ever.

5. The email is poorly written

Typos happen. That’s not exactly what we’re talking about here. We’re talking about consistently missed words or poorly phrased sentences, which are clear signs a non-native English speaker wrote the email. 

Reputable companies don’t let that happen. They have editors and proofreaders who verify their emails look professional before they’re sent out. 

6. There is a suspicious attachment

Attachments are pretty common, so we don’t worry about them too much, but we should. 

If you see an email with an unexpected attachment, be suspicious. Most reputable companies will ask you to download assets from their website and will not send you an attachment. 

7. The message is super urgent

A favourite tactic of phishing scams is to put the pressure on right away. The email may claim you have missed a payment, owe the government money or have been recorded through your laptop’s camera. 

These tactics are intended to make you panic and rush to respond to the situation, which means you’ll click on their links to get to the bottom of it. Boom. You’re a phish on the hook!

Don’t respond to high-pressure emails unless you know the reason it appeared. Even if you’re late on your credit card payment and receive a nastygram from your credit card company, don’t use a link from that email to pay or put in information. Go directly to the website.

8. The email doesn’t use your name in the greeting

Does this look familiar? “Dear valued customer” or “Greetings, friend.” Yeah, this is a dead giveaway that an email isn’t from a source you know or work with regularly. 

Any company you have an account with should know your name and use it in emails. That’s standard stuff. If you’re not greeted by name, the sender doesn’t know you, and you probably don’t know them (and don’t want to).

9. The whole email is a hyperlink

If your cursor turns into the pointing hand no matter where it is on the email, the entire email is one giant hyperlink. Why? If the whole email is a hyperlink, any random mouse click delivers the sender’s virus or malware. 

Why wait for you to open an attachment if the hacker can get you with any click? This one is fairly easy to spot and a dead giveaway.

10. The email is from a public domain

If you get an email claiming to be from a business you know and trust, but the sender’s email address is from a public domain like @gmail.com or @outlook.com, this is another red flag. 

Businesses that frequently send out emails have their own domain names, and all emails should come from that domain. If Jill is claiming to be from Verizon, but her email is Jillydill@yahoo.com, you know it’s at least spam but very likely a phishing attempt.

What should you do if you’re not sure?

If you get a puzzling email, pause before doing anything with it. Go over this list and look for clues. If you’re still not sure, the best thing you can do is contact the company in question directly, not through that email. 

Go directly to the company’s website or call the company and explain what you saw in the email.

It’s possible you’ll alert the company of a fraud scheme it is unaware of. You may also learn the email is legit. Either way, by contacting the company directly, you’ve avoided the unnecessary risk from a phishing attack.

How do I report a phishing email?

If you’re fairly certain you have a phishing email on your hands, you can report it to the FTC or forward it to spam@uce.gov and reportphishing@apwg.org. 

Keeping a watchful eye on your inbox and reporting suspicious emails is your best bet to fight back against phishing.

Featured Resources

Security analytics for your multi-cloud deployments

IBM Security QRadar SIEM solution brief

Download now

Five reasons to move to the cloud

Join the enterprises moving their workloads to the cloud

Download now

Architecting hybrid IT and edge for digital advantage

Why business leaders should consider a hybrid IT strategy

Download now

Six reasons to accelerate remote asset monitoring with AI

How to optimise resources, increase productivity, and grow profit margins with AI

Download now

Recommended

Lazarus APT hacking group is targeting the defense industry
Security

Lazarus APT hacking group is targeting the defense industry

26 Feb 2021
Microsoft open sources CodeQL queries used in Solorigate inquiry
Security

Microsoft open sources CodeQL queries used in Solorigate inquiry

26 Feb 2021
CISA warns of ongoing Accellion File Transfer Appliance attacks
hacking

CISA warns of ongoing Accellion File Transfer Appliance attacks

25 Feb 2021
What is a Trojan?
Security

What is a Trojan?

25 Feb 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
How to use Chromecast without Wi-Fi
Mobile

How to use Chromecast without Wi-Fi

26 Feb 2021