Six tell-tale signs of a phishing email
Every day, over 300 billion emails are sent!
Take a look at your own inbox – you probably have messages from your bank, promotions from your favourite online shop, work updates… and the list goes on.
But do you ever find yourself wondering if the email is genuine or not?
Then you’re not alone.
Phishing emails, whereby scammers attempt to trick unsuspecting users into giving over details, sending money or clicking on malicious attachments, are nothing new. In fact, they have been one of the most common attack vectors for a number of years. However, due to the increasing sophistication of scams, knowing how to spot a phishing email is becoming more difficult than ever.
With that in mind, here are six tell-tale signs that an email is a phishing attempt.
Grammar and spelling errors
Probably one of the easiest ways to spot a phishing email is if it contains poor spelling and grammar. Indeed, it’s amazing how easy it is to spot an attempt by the poor language used in the messaging. And believe it or not, the theory is cyber criminals intentionally send error-ridden emails to screen out individuals who may be less attentive or unable to recognise faults, thus making them easier targets.
So, make sure you read emails carefully, checking for spelling and grammatical mistakes, as well as strange phrasing. Emails that have come from a legitimate organisation should be well written.
Top tip: Look for grammatical mistakes over anything. Cyber criminals will often use a spell checker or translation machine which gives them the right words but not always in the right context.
Inconsistencies in email addresses, URLs & domain names
Another simple way to identify a potential phishing attempt is by looking for differences in email addresses, URLs, and domain names. Scammers will often spoof email addresses and change display names to make emails appear to have come from a contact of the victim or an official source.
Take time to hover your mouse over the display name and if the domain name (the part after the @ symbol) matches the apparent sender, the message should be legitimate. If a link is embedded, make sure to also hover your mouse over the link to verify what pops up. Finally, checking prior correspondence to see if the email addresses match can help you identify if the email is coming from who they say they are.
Top tip: Be sure to inspect closely – in some case hackers will simply add an extra letter which at a glance, you may not spot! If the domain names don’t match, don’t click.
Suspicious attachments and links
If you receive an email containing an attachment, alarm bells should ring – especially if it is about something unexpected. It could contain a malicious URL or trojan which works by installing a virus or malware onto your PC or network once clicked. Keep an eye out for high-risk attachment file types such as .exe, .scr and .zip.
Always remember that a legitimate organisation will not randomly send you emails with attachments, and, if they do, they will most likely direct you to their website to do so. However, as discussed above, it is best practice to hover over links to verify where they will take you to.
Top tip: When in doubt, contact the company or person directly over the phone using verified details obtained from a website or used previously.
Urgent action required or threats
A common phishing tactic is to instil panic on the recipient. For instance, the email may tell you to act now to claim a reward or avoid a penalty. Alternatively, it may say your account has been compromised and that the only way to verify it is to input your login information; or worse, it may indicate that your account will be closed if no action is taken.
Generally speaking, emails that threaten negative consequences or demand immediate action should be treated with suspicion.
Top tip: Take the time to think about whether an email is asking something reasonable. Would a company or the individual really ask that of you out of the blue?
Request for sensitive information
These days, phishing emails are very sophisticated. Scammers go to extreme lengths to ensure the emails they send imitate legitimate businesses – and they can be hard to spot. However, a big give away that an email is not from a trusted source if often when an authentic-looking message makes unusual requests such as confirming personal information you would never usually provide.
Legitimate organisations rarely ask customers to enter login credentials or other private information through an email. This is as a precautionary measure designed to safeguard consumers and help customers spot fraudulent and legitimate emails.
Top tip: Do not use any communication method provided in the email.
Impersonal greetings
In a typical phishing email, scammers will use more generic greetings such as ‘Dear customer’, ‘Dear valued member’ and ‘Dear account holder’. This is because they are generating thousands of emails from compromised accounts, but don’t normally have each name of every receiver. Legitimate businesses on the other hand will often personalise their communications and direct for you to call them via phone.
Top tip: This is an obvious tell for phishing attacks which are launched in bulk. However, spear phishing attacks will normally be personalised so always check for other signs.
Education is the best protection
In today’s world, cyber criminals are showing no signs of slowing down their phishing activity. And the continued rise of these attacks poses a significant threat to all organisations. Successful attacks give digital fraudsters a foothold in company networks, access to vital information and in some cases money. While certain email gateways can detect many of these attacks before they reach end users, many users (both corporate and consumer) do not have this protection. Therefore, the best protection becomes education. Indeed, it is crucial that your staff are educated on how to spot and avoid phishing attacks.
Here at the entrust IT Group we have over 16 years of experience in the cyber security sector. Over that time, we have worked with many of our customers to educate their staff on phishing as well as implemented some of the best monitoring and end-point security solutions – all of which significantly mitigate the risk of an attack occurring. Please get in touch with a member of the team on 0330 002 0045 or email enquiries@entrustit.co.uk if you think you too could benefit from our help.
Alternatively, why not download our FREE eBook on how you can stay safe while online? Estimated read time – 5 mins! >>
Subscribe here!
Recent Posts
Posts by tag
- technology (124)
- Security (97)
- cyber security (85)
- IT Security (81)
- Cloud (65)
- Microsoft 365 (63)
- modern technology (62)
- Managed Service (60)
- business (60)
- cloud computing (59)
- cyber attack (54)
- workplace (54)
- IT support (53)
- cloud it (53)
- Microsoft Teams (52)
- microsoft (51)
- Working from home (50)
- productivity (47)
- office (46)
- cybersecurity (44)
- office 365 (44)
- IT (41)
- Uncategorised (38)
- employees (38)
- entrustit (38)
- flexible work (36)
- Password Security (34)
- Remote (33)
- efficiency (31)
- Hosted Workspace (30)
- hosted desktop (30)
- schools (29)
- independent schools (28)
- school ict (27)
- collaboration (26)
- 2023 (25)
- Cyber (24)
- cyber privacy (22)
- public cloud (22)
- computing (21)
- email security (20)
- password (20)
- it support bournemouth (19)
- passwords (19)
- entrust (18)
- hosted applications (18)
- VoIP (17)
- cloud voip (17)
- covid19 (17)
- hacking (17)
- private cloud (17)
- data (16)
- it support dorset (16)
- teamwork (16)
- Coronavirus (15)
- GDPR (14)
- hackers (14)
- office 365 support (14)
- ransomware (14)
- IT audit (13)
- Protection (13)
- cloud cctv (13)
- covid-19 (13)
- hack (13)
- it support hampshire (13)
- management (13)
- network (13)
- Hosted Desktop and Applications (12)
- Windows Virtual Desktop (12)
- cctv (12)
- hardware (12)
- internet (12)
- it consultancy (12)
- 2020 (11)
- 2022 (11)
- hybrid cloud (11)
- internet safety (11)
- IT costs (10)
- Microsoft Planner (10)
- data breach (10)
- it consultancy bournemouth (10)
- it support southampton (10)
- it support winchester (10)
- phishing (10)
- vulnerabilities (10)
- windows (10)
- windows 10 (10)
- Backup (9)
- bitwarden (9)
- digital (9)
- it consultancy hampshire (9)
- telephony (9)
- attack (8)
- communication (8)
- desk phone (8)
- education (8)
- eu (8)
- it consultancy dorset (8)
- it consultancy southampton (8)
- msp (8)
- planning (8)
- software (8)
- staff (8)
- uk (8)
- Google (7)
- OneDrive (7)
- infrastructure (7)
- mobile (7)
- offsite backup (7)
- outsource (7)
- partnership (7)
- 2019 (6)
- Apple (6)
- Hampshire (6)
- IT Director (6)
- Skype for Business (6)
- apps (6)
- architect (6)
- child protection (6)
- cloud storage (6)
- european union (6)
- hacks (6)
- legal (6)
- legal it (6)
- mobile phones (6)
- onsite backup (6)
- password manager (6)
- remote desktop service (6)
- usecure (6)
- virus (6)
- 3d design desktop (5)
- Azure (5)
- Bournemouth (5)
- Desktop (5)
- ISO (5)
- News (5)
- Risk assessment (5)
- Windows 7 (5)
- awards (5)
- brexit (5)
- designer (5)
- personal data (5)
- resources (5)
- smartphone (5)
- website (5)
- Access Management (4)
- BYOD (4)
- Dorset (4)
- Facebook (4)
- Government (4)
- SharePoint (4)
- VPN (4)
- WannaCry (4)
- ios (4)
- law (4)
- legacy (4)
- proactive (4)
- remote learning (4)
- 2021 (3)
- 2024 (3)
- Attacks (3)
- Case Studies (3)
- General (3)
- Google Drive (3)
- Help (3)
- IP (3)
- Microsoft Forms (3)
- NHS (3)
- New Forest (3)
- Zoom (3)
- big switch off (3)
- budgets (3)
- citrix (3)
- closed cloud (3)
- ddos (3)
- digital hub (3)
- disaster recovery (3)
- guide (3)
- instagram (3)
- internet of things (3)
- meetings (3)
- sme (3)
- storage (3)
- surrey (3)
- teaching (3)
- trump (3)
- twitter (3)
- 2016 (2)
- 2018 (2)
- CAD (2)
- DR (2)
- DR planning (2)
- Environment (2)
- Firewall (2)
- Gen Z (2)
- ISBA (2)
- Local (2)
- Macs (2)
- Microsoft Copilot (2)
- PaaS (2)
- Tiva (2)
- android (2)
- artificial intelligence (2)
- award winning (2)
- bcs (2)
- broadband (2)
- camcloud (2)
- computer performance (2)
- digital transformation (2)
- downtime (2)
- dropbox (2)
- exhibition (2)
- finalist (2)
- innovation (2)
- legalex (2)
- london (2)
- macos (2)
- online meetings (2)
- organisation (2)
- paypal (2)
- predictions (2)
- president (2)
- strategy (2)
- united kingdom (2)
- us (2)
- video conferencing tools (2)
- 1998 (1)
- 5G (1)
- AI (1)
- AMD (1)
- ARM (1)
- Abbey Hill (1)
- Aldwickbury Park (1)
- BBC (1)
- BUNKERS! (1)
- Birchwood Park (1)
- Burhill (1)
- Burhill Group (1)
- Burnout (1)
- CEO (1)
- ChatGPT (1)
- Cloudtango (1)
- GPT-4 (1)
- Go Integrator (1)
- Hoebridge (1)
- Ignite 2018 (1)
- Ignite 2020 (1)
- Leaders (1)
- Loop (1)
- MFA (1)
- MSP Select 2024 (1)
- Market (1)
- May (1)
- Mr Mulligans (1)
- Multi Factor Authentication (1)
- MyAnalytics (1)
- Ninja Warrior UK (1)
- PBX (1)
- PM (1)
- Power BI (1)
- Privacy Shield (1)
- Ramsdale Park (1)
- Redbourn (1)
- Regulation (1)
- Surrey Business Awards (1)
- Sydenhams (1)
- Tech Company of the Year (1)
- The Business Magazine (1)
- Thornbury (1)
- WCry (1)
- WannaCrypt (1)
- Wifi (1)
- Wycombe Heights (1)
- acquisition (1)
- afc bournemouth (1)
- afcb (1)
- ashley madison (1)
- b2b (1)
- bandwidth (1)
- battersea (1)
- beach (1)
- big data (1)
- bloatware (1)
- blockchain (1)
- builders merchant (1)
- cambridge analytica (1)
- canada (1)
- cia (1)
- clinton (1)
- cnn (1)
- copilot (1)
- copilot pro (1)
- copyright (1)
- cryptocurrency (1)
- dark web (1)
- dns (1)
- donald (1)
- dyn (1)
- east grinstead (1)
- election (1)
- equality (1)
- executive order (1)
- farnham (1)
- fax (1)
- football (1)
- gchq (1)
- grinstead (1)
- intel (1)
- intelligence (1)
- josh widdicombe (1)
- landmarks (1)
- learning (1)
- legal technology forum (1)
- machine learning (1)
- meltdown (1)
- millennials (1)
- mirai (1)
- no-deal (1)
- onsite (1)
- paper (1)
- patisserie valerie (1)
- performance reviews (1)
- pound (1)
- premier league (1)
- procrastination (1)
- recruitment (1)
- research (1)
- serval systems (1)
- sharefile (1)
- smishing (1)
- snowden (1)
- solent (1)
- solent business awards (1)
- solentBA (1)
- spectre (1)
- sterling (1)
- storm (1)
- talktalk (1)
- trumppresident (1)
- ukitawards (1)
- united states (1)
- usa (1)
- vault 7 (1)
- vitality stadium (1)
- whatsapp (1)
- white (1)
- white house (1)
- wikileaks (1)
- wireless internet bournemouth (1)
- wireless internet southampton (1)
- women in business (1)
- xiongmai (1)
- year (1)