How to recognise a Phishing attack
In this lesson, you'll learn how to identify red flags in phishing emails to protect yourself. Look for alarming subject lines, suspicious sender addresses, unusual timing, and negative feeling-inducing content. Never click links or download attachments from unknown sources.
In this video, you will learn how to recognise the red flags or danger signs of phishing emails so that you can react properly when you encounter them. Not all phishing emails look the same.
Here are the red flags you should look out for when receiving a suspicious email.
- The subject line: If the subject line is alarming, this is a red flag. Cybercriminals make sure to use a subject line that will make you act quickly.
- The To, From and Reply to: If you don't know the sender and can't verify the email address, this is a red flag! Cybercriminals can spoof emails by making them look like they came from someone you know or trust.
- The date line: If you received the email at an unusual time or outside of normal business hours, this is a red flag.
- Content of the email: Cybercriminals use curiosity, fear, greed, or even your willingness to help to create urgency for you to act immediately. Listen to your intuition: if the email triggers an unpleasant feeling or just seems strange or illogical, don't act.
- Links or attachments: If you are being asked to click or download something to avoid a negative consequence, this is a red flag. Cybercriminals want you to click on a link or open an attachment so that they can trick you into installing malicious software on your device.
Here is an example of a phishing email: The sender asks you for sensitive information, it contains unsolicited attachments, uses poor spelling and grammar, and attempts to make you panic. If you suspect that an email you received is a phishing attempt, contact your cybersecurity team immediately and wait for further instructions. Meanwhile, Do not click on links. Do not download any attachments. Do not forward the email or attempt to investigate yourself.
By following these simple rules you learned today, you will ensure that your personal and company information is safe.