Skip to main content

Phishing attacks are a common cyberthreat where scammers attempt to trick you into revealing sensitive information like passwords, credit card details, or social security numbers. They do this by sending emails that appear to be from legitimate sources, such as banks, social media platforms, or even your own company.

How to Spot a Phishing Email:

  • Check the sender’s address carefully: Look closely at the email address of the sender. Phishers often use addresses that closely resemble legitimate ones, but with slight variations (e.g., “amason.co.uk” instead of “amazon.co.uk”).
  • Be wary of urgent requests: Phishing emails often use urgent language to pressure you into clicking on links or opening attachments. Phrases like “Urgent Action Required,” “Your account is about to be suspended,” or “You have won a prize!” should raise red flags.
  • Look for suspicious links: Hover your mouse over any links in the email without clicking on them. This will display the actual URL of the link in the status bar of your browser. If the URL looks suspicious or doesn’t match the displayed text, do not click on it.
  • Be cautious of attachments: Avoid opening attachments from unknown senders, even if they appear to be from someone you know. Phishing emails often contain malicious attachments that can infect your computer with malware.
  • Check for grammatical errors and typos: Phishing emails are often poorly written with grammatical errors and typos. Legitimate companies typically have professional marketing teams that carefully proofread their communications.

What to Do If You Suspect a Phishing Email:

  • Do not click on any links or open any attachments.
  • Do not reply to the email.
  • Forward the email to your IT department or the appropriate security team.

Tips for Preventing Phishing Attacks:

  • Keep your software updated: Ensure your operating system and antivirus software are up-to-date with the latest security patches.
  • Be skeptical of unexpected emails: If you receive an unexpected email, even from someone you know, be cautious and verify its authenticity before taking any action.
  • Use strong, unique passwords: Avoid using the same password for multiple accounts.
  • Enable two-factor authentication: Two-factor authentication adds an extra layer of security by requiring two forms of identification before you can access your accounts.

Click here to discuss cybersecurity for your organisation.