Simple Rules To Spot a Phishing Email
Cybersecurity tools have gotten much better at blocking threats, so cybercriminals have shifted tactics to target the next weakest link—you. These phishing emails are designed to exploit human behavior and trick users into handing over sensitive data or access to business networks. Follow these simple rules to protect yourself and your organization from becoming a victim.
How Do Phishing Attacks Work?
Phishing emails aim to trick you into clicking links, downloading malicious attachments, or entering your credentials into a fake login page. Although phishing messages often appear legitimate, you can spot them by looking out for a few common warning signs:
1. Confirm Who Sent It
Double-check the “From” email address for typos or suspicious domains. Look up the sender’s address on the company’s website or using services like VerifyEmailAddress.org, PhishTank, or Scammed.by to see if it has been reported.
2. Don’t Make Quick Decisions
Phishing emails often use scare tactics or urgent messages like “account suspension” or “claim your prize” to prompt quick action. Take a breath, read carefully, and investigate before clicking.
3. Check the Wording
Legitimate companies invest in good writing. Be skeptical of emails with poor grammar, spelling errors, or vague greetings like “Dear Sir/Madam.” These are red flags that indicate phishing attempts.
4. Check Links Before You Click
Hover over links to inspect their destination. Look out for misspellings or suspicious URLs like paypal.com.co.ru
instead of paypal.com
. If unsure, visit the site directly through your browser.
5. Beware of Attachments
Attachments—especially ZIP, DOC, XLS, or PDF files—can contain Remote Access Trojans (RATs) that give attackers control of your device. Only open files from trusted, verified sources.
For more phishing prevention tips, visit:
← View All ArticlesHOW DO PHISHING ATTACKS WORK?
The purpose of a phishing email is to gain access to your personal information and your company’s network, by tricking you to click a link, download an attachment, or login to a fraudulent website which will grant the attackers access to your computer, or smartphone. Although; these emails will look very close to their legitimate counterparts there are a few key details you should know to look for that will set off red-flags.
1.) CONFIRM WHO SENT IT
If you get an unexpected, or urgent seeming email from what looks like a trusted company, make sure the “From:” email address is what you were expecting and spelled correctly. When in doubt search your inbox for previous emails to double check, or use a search engine and paste the incoming email address in. If the email is legitimate you will find it on the company’s website. Other the other hand, many times scammers will use the same or similar fraudulent email addresses, for the same campaigns and you might be lucky enough to find that someone else has already listed it as spam or a phishing email. There are also free resources online to check if an email address is valid using VerifyEmailAddress.org, as well as to check if it has been reported to be used in a scam like PhishTank.com or see what scams have been associated with that email with Scammed.by.2.) DON’T MAKE QUICK DECISIONS
[/ffb_param][/ffb_paragraph_2][ffb_paragraph_2 unique_id=”1pb4kr1o” data=”%7B%22o%22%3A%7B%22gen%22%3A%7B%22ffsys-disabled%22%3A%220%22%2C%22ffsys-info%22%3A%22%7B%7D%22%2C%22text-is-richtext%22%3A%221%22%2C%22align%22%3A%22text-left%22%2C%22align-sm%22%3A%22%22%2C%22align-md%22%3A%22%22%2C%22align-lg%22%3A%22%22%7D%2C%22b-m%22%3A%7B%22pd-xs%22%3A%7B%22t%22%3A%2220%22%7D%7D%7D%7D”][ffb_param route=”o gen text”] If the message of the email is something very urgent, or unsettling and asks you to visit the link they provide, be very suspicious. Many scammers will try to play on your emotions to get you to act without thinking. These can range from emails claiming that you’ve won a prize, a “Free” vacation, or threats like an audit, account termination, or account renewal. [/ffb_param][/ffb_paragraph_2][ffb_imageSlider_2 unique_id=”1pb5ioc9″ data=”%7B%22o%22%3A%7B%22gen%22%3A%7B%22ffsys-disabled%22%3A%220%22%2C%22ffsys-info%22%3A%22%7B%7D%22%2C%22content%22%3A%7B%220-%7C-one-slide%22%3A%7B%22one-slide%22%3A%7B%22img%22%3A%7B%22img%22%3A%22%7B%5C%22id%5C%22%3A3837%2C%5C%22url%5C%22%3A%5C%22https%3A%2F%2Fwww.netmonservices.com%2Fwp-content%2Fuploads%2F2017%2F09%2FPaypal-email.png%5C%22%2C%5C%22width%5C%22%3A709%2C%5C%22height%5C%22%3A721%7D%22%7D%7D%7D%2C%221-%7C-one-slide%22%3A%7B%22one-slide%22%3A%7B%22img%22%3A%7B%22img%22%3A%22%7B%5C%22id%5C%22%3A3849%2C%5C%22url%5C%22%3A%5C%22https%3A%2F%2Fwww.netmonservices.com%2Fwp-content%2Fuploads%2F2017%2F10%2Finterac-phishing-scam-example.png%5C%22%2C%5C%22width%5C%22%3A756%2C%5C%22height%5C%22%3A764%7D%22%7D%7D%7D%2C%222-%7C-one-slide%22%3A%7B%22one-slide%22%3A%7B%22img%22%3A%7B%22img%22%3A%22%7B%5C%22id%5C%22%3A3840%2C%5C%22url%5C%22%3A%5C%22https%3A%2F%2Fwww.netmonservices.com%2Fwp-content%2Fuploads%2F2017%2F09%2Fphishing124_clip_image001.png%5C%22%2C%5C%22width%5C%22%3A601%2C%5C%22height%5C%22%3A451%7D%22%7D%7D%7D%7D%2C%22l-arrow%22%3A%22ff-font-awesome4 icon-arrow-left%22%2C%22r-arrow%22%3A%22ff-font-awesome4 icon-arrow-right%22%2C%22use-auto%22%3A%220%22%2C%22speed%22%3A%225000%22%2C%22use-hover%22%3A%221%22%2C%22use-loop%22%3A%221%22%2C%22use-navigation%22%3A%221%22%2C%22arrows-color%22%3A%22%5B1%5D%22%2C%22arrows-color-hover%22%3A%22%23000000%22%2C%22arrows-background%22%3A%22rgba(204%2C 204%2C 204%2C 0.67)%22%2C%22arrows-background-hover%22%3A%22rgba(204%2C 204%2C 204%2C 0.67)%22%7D%2C%22b-m%22%3A%7B%22mg-xs%22%3A%7B%22t%22%3A%2220%22%2C%22r%22%3A%2210%22%2C%22b%22%3A%2220%22%2C%22l%22%3A%2210%22%7D%2C%22mg-sm%22%3A%7B%22r%22%3A%2220%22%2C%22l%22%3A%2220%22%7D%2C%22mg-md%22%3A%7B%22r%22%3A%2230%22%2C%22l%22%3A%2230%22%7D%2C%22mg-lg%22%3A%7B%22r%22%3A%2260%22%2C%22l%22%3A%2260%22%7D%2C%22borders%22%3A%7B%220-%7C-one-border%22%3A%7B%22one-border%22%3A%7B%22color%22%3A%22rgba(128%2C 128%2C 128%2C 0.26)%22%7D%7D%7D%2C%22box-shadows%22%3A%7B%220-%7C-one-box-shadow%22%3A%7B%22one-box-shadow%22%3A%7B%7D%7D%7D%7D%7D%7D”][/ffb_imageSlider_2][ffb_paragraph_2 unique_id=”1pavgplc” data=”%7B%22o%22%3A%7B%22gen%22%3A%7B%22ffsys-disabled%22%3A%220%22%2C%22ffsys-info%22%3A%22%7B%7D%22%2C%22text-is-richtext%22%3A%220%22%2C%22align%22%3A%22text-left%22%2C%22align-sm%22%3A%22%22%2C%22align-md%22%3A%22%22%2C%22align-lg%22%3A%22%22%7D%2C%22b-m%22%3A%7B%22pd-xs%22%3A%7B%22t%22%3A%2260%22%7D%7D%7D%7D”][ffb_param route=”o gen text”]3.) CHECK THE WORDING
[/ffb_param][/ffb_paragraph_2][ffb_paragraph_2 unique_id=”1pb4t2e2″ data=”%7B%22o%22%3A%7B%22gen%22%3A%7B%22ffsys-disabled%22%3A%220%22%2C%22ffsys-info%22%3A%22%7B%7D%22%2C%22text-is-richtext%22%3A%221%22%2C%22align%22%3A%22text-left%22%2C%22align-sm%22%3A%22%22%2C%22align-md%22%3A%22%22%2C%22align-lg%22%3A%22%22%7D%7D%7D”][ffb_param route=”o gen text”] Are there spelling, grammar or syntax mistakes? Large companies and organizations have people on staff to review materials before there sent to make sure spelling and grammar are good. The scammers creating phishing emails do not, and are often times not primarily english speaking. For these reasons it is always a good idea to review emails for these errors to determine the legitimacy of an email communication. Especially if it is asking for information, or for you to click a link or download a file. Do they address you with a vague greeting like “Mr/Mrs” or “Dear Sir or Madam” or “To Whom It May Concern”? Unless this is a message you’re expecting, and the tone is appropriate for the context. Most legitimate organizations know their audience, and will customize their greeting to either identify you by your first and/or last name or username, or will have a greeting that specifically identifies you as their customer. [/ffb_param][/ffb_paragraph_2][ffb_before-after-slider_2 unique_id=”1pbftfab” data=”%7B%22o%22%3A%7B%22gen%22%3A%7B%22ffsys-disabled%22%3A%220%22%2C%22ffsys-info%22%3A%22%7B%7D%22%2C%22before%22%3A%7B%22img%22%3A%7B%22img%22%3A%22%7B%5C%22id%5C%22%3A4433%2C%5C%22url%5C%22%3A%5C%22https%3A%2F%2Fwww.netmonservices.com%2Fwp-content%2Fuploads%2F2017%2F12%2Fms-secuity-update-phish.jpg%5C%22%2C%5C%22width%5C%22%3A587%2C%5C%22height%5C%22%3A511%7D%22%7D%2C%22title%22%3A%22Slide to Reveal Red Flags%22%2C%22width%22%3A%22130%22%2C%22overlay-labels-background-color%22%3A%22rgba(255%2C 255%2C 255%2C 0.2)%22%2C%22overlay-labels-color%22%3A%22%23ffffff%22%7D%2C%22after%22%3A%7B%22img%22%3A%7B%22img%22%3A%22%7B%5C%22id%5C%22%3A4463%2C%5C%22url%5C%22%3A%5C%22https%3A%2F%2Fwww.netmonservices.com%2Fwp-content%2Fuploads%2F2017%2F12%2Fms-secuity-update-reveal.jpg%5C%22%2C%5C%22width%5C%22%3A587%2C%5C%22height%5C%22%3A511%7D%22%7D%2C%22title%22%3A%22%22%2C%22width%22%3A%22130%22%2C%22overlay-labels-background-color%22%3A%22rgba(255%2C 255%2C 255%2C 0.2)%22%2C%22overlay-labels-color%22%3A%22%23ffffff%22%7D%2C%22orientation%22%3A%22horizontal%22%2C%22aspect-ratio%22%3A%221%22%2C%22position%22%3A%2290%22%2C%22overlay-background-color%22%3A%22rgba(0%2C 0%2C 0%2C 0.5)%22%2C%22circle-arrows-color%22%3A%22%23ffffff%22%2C%22circle-background-color%22%3A%22%22%2C%22circle-border-color%22%3A%22%23ffffff%22%2C%22circle-shadow-color%22%3A%22rgba(51%2C 51%2C 51%2C 0.5)%22%2C%22lines-color%22%3A%22%23ffffff%22%2C%22lines-shadow-color%22%3A%22rgba(51%2C 51%2C 51%2C 0.5)%22%7D%2C%22b-m%22%3A%7B%22mg-xs%22%3A%7B%22t%22%3A%2220%22%2C%22r%22%3A%2210%22%2C%22b%22%3A%2220%22%2C%22l%22%3A%2210%22%7D%2C%22mg-sm%22%3A%7B%22r%22%3A%2220%22%2C%22l%22%3A%2220%22%7D%2C%22mg-md%22%3A%7B%22r%22%3A%2230%22%2C%22l%22%3A%2230%22%7D%2C%22mg-lg%22%3A%7B%22r%22%3A%2260%22%2C%22l%22%3A%2260%22%7D%2C%22borders%22%3A%7B%220-%7C-one-border%22%3A%7B%22one-border%22%3A%7B%22color%22%3A%22rgba(128%2C 128%2C 128%2C 0.26)%22%7D%7D%7D%2C%22box-shadows%22%3A%7B%220-%7C-one-box-shadow%22%3A%7B%22one-box-shadow%22%3A%7B%7D%7D%7D%7D%7D%7D”][/ffb_before-after-slider_2][ffb_paragraph_2 unique_id=”1pbf29tl” data=”%7B%22o%22%3A%7B%22gen%22%3A%7B%22ffsys-disabled%22%3A%220%22%2C%22ffsys-info%22%3A%22%7B%7D%22%2C%22text-is-richtext%22%3A%221%22%2C%22align%22%3A%22text-left%22%2C%22align-sm%22%3A%22%22%2C%22align-md%22%3A%22%22%2C%22align-lg%22%3A%22%22%7D%2C%22b-m%22%3A%7B%22pd-xs%22%3A%7B%22t%22%3A%2260%22%7D%7D%7D%7D”][ffb_param route=”o gen text”]4.) CHECK LINKS BEFORE YOU CLICK
[/ffb_param][/ffb_paragraph_2][ffb_paragraph_2 unique_id=”1pbf2fr4″ data=”%7B%22o%22%3A%7B%22gen%22%3A%7B%22ffsys-disabled%22%3A%220%22%2C%22ffsys-info%22%3A%22%7B%7D%22%2C%22text-is-richtext%22%3A%221%22%2C%22align%22%3A%22text-left%22%2C%22align-sm%22%3A%22%22%2C%22align-md%22%3A%22%22%2C%22align-lg%22%3A%22%22%7D%7D%7D”][ffb_param route=”o gen text”] If the previous rules don’t give you reason to dismiss the email as a phishing attack, a sure-fire way is to check the destination of any link they are directing you to. By hovering your mouse over a link you can check the destination it will send you (on most mobile phones you can press and hold on the link to see the destination). What you want to look out for, is links that contain misspelled, or improper URLs likepaypal.com.co.ru
, or support-apple.io
, when you are expecting the official address of a trusted entity. These unofficial websites are usually designed to trick you into providing cyber criminals with your login information, or secretly download malware onto your device.
When in doubt, it is always best to go to the official website directly, or by using a search engine.
[/ffb_param][/ffb_paragraph_2][ffb_image_2 unique_id=”1pgqlvld” data=”%7B%22o%22%3A%7B%22gen%22%3A%7B%22ffsys-disabled%22%3A%220%22%2C%22ffsys-info%22%3A%22%7B%7D%22%2C%22img%22%3A%7B%22img%22%3A%22%7B%5C%22id%5C%22%3A4501%2C%5C%22url%5C%22%3A%5C%22https%3A%2F%2Fwww.netmonservices.com%2Fwp-content%2Fuploads%2F2017%2F12%2Fphishing-hover-link.png%5C%22%2C%5C%22width%5C%22%3A589%2C%5C%22height%5C%22%3A256%7D%22%7D%2C%22blank%22%3A%22null%22%7D%2C%22b-m%22%3A%7B%22mg-xs%22%3A%7B%22t%22%3A%2220%22%2C%22r%22%3A%2210%22%2C%22b%22%3A%2220%22%2C%22l%22%3A%2210%22%7D%2C%22mg-sm%22%3A%7B%22r%22%3A%2220%22%2C%22l%22%3A%2220%22%7D%2C%22mg-md%22%3A%7B%22r%22%3A%2230%22%2C%22l%22%3A%2230%22%7D%2C%22mg-lg%22%3A%7B%22r%22%3A%2260%22%2C%22l%22%3A%2260%22%7D%7D%7D%7D”][/ffb_image_2][ffb_paragraph_2 unique_id=”1pdjidfa” data=”%7B%22o%22%3A%7B%22gen%22%3A%7B%22ffsys-disabled%22%3A%220%22%2C%22ffsys-info%22%3A%22%7B%7D%22%2C%22text-is-richtext%22%3A%221%22%2C%22align%22%3A%22text-left%22%2C%22align-sm%22%3A%22%22%2C%22align-md%22%3A%22%22%2C%22align-lg%22%3A%22%22%7D%2C%22b-m%22%3A%7B%22pd-xs%22%3A%7B%22t%22%3A%2260%22%7D%7D%7D%7D”][ffb_param route=”o gen text”]