90% of Data Breaches Involve a Phishing Attack
First things first – what is phishing? Phishing is an email technique used to fraudulently obtain sensitive information. Phishing emails are designed to look like they’re from a brand or institution you trust. They typically prompt you to download malware (malicious software), click on a link that redirects you to a malicious website or enter personal information. This can enable hackers to steal your identity, breach your employer’s systems, and more. The best way to defend yourself against phishing attacks is to identify phony emails before you click on them.
5 Tips for Identifying Phishing Emails
- Who’s the real sender? – Make sure the organization’s name in the “From” field matches the address between the brackets. Watch out for addresses that contain typos in the organization name (think amaz0n.com).
- Check the salutation – If you do business with an organization, the first line of the email should contain your name. Don’t trust impersonal introductions like “Dear Customer.”
- Use your mouse hover – Hover over an email link to see the full URL it will direct you to. Do not click the link – just hover. If the address isn’t where you’d expect it to go, don’t click it. Check all the links – if the URLs are all the same, it’s likely a phishing email.
- What’s in the footer? – The footer of any legitimate email should contain, at minimum, a physical address for the brand or institution and an unsubscribe button. If either of these items are missing, it’s probably fake.
- Look for other content clues – Does the content have spelling and grammar errors, ask for personal or sensitive information, convey a high sense of urgency and/or privacy, offer incentives through threat or reward, or contain links or attachments? These are all clues pointing toward a phishing email.
When in Doubt, Delete
If something seems off, delete the email. If it’s not fake, the sender will contact you another way or send the message again.
We Can Help…
Think Network Technologies offers IT Consulting services to can help your organization keep systems and information secure. For more information about this topic and how we can support your business, contact us.
Source: Webroot Inc.