malicious phishing email

For those who aren’t in the know, phishing emails are a type of malicious email that is designed to trick the recipient into giving away personal information or clicking on a malicious link.

These emails usually look like they come from a legitimate source, such as a company or organisation that you do business with. This is why phishing emails can be very difficult to identify – and yet, InfoTrust online security knows some tell-tale signs that you can keep an eye out for.

What signs should you look out for that will identify a phishing email?

  1. The first thing to look for is the sender of the email. Legitimate companies will almost always use an email address that ends in their company name (i.e. example@companyname.com). If the email is from a Gmail or Yahoo account, for example, it is more likely to be a phishing email. You should also be wary of emails that are addressed to generic recipients such as “Customer” or “Account Holder”.
  2. Another sign of a phishing email is suspicious attachments or links. If you receive an attachment from someone that you don’t know, or from a company that you do business with but that you’re not expecting an attachment from, it’s best to delete the email without opening it. The same goes for links. If you hover your mouse over a link without clicking on it, you should be able to see the URL that the link will take you to. If this URL looks suspicious, it’s probably best not to click on it.
  3. Finally, watch out for grammar and spelling mistakes in the body of the email. While these mistakes can occur in legitimate emails, they are more common in phishing emails since these emails are usually written by someone whose first language is not English.

Protect your organisation against the treat of phishing emails

Phishing emails are a serious threat to businesses and individuals alike. But with a little vigilance, you can pick up on a malicious phishing email before it’s had a chance to do any damage to your IT system.

Keep the above tips in mind and be sure to pass them on to your entire team, as any device within the organisation that gets compromised can end up giving cyber-attackers access to your entire cloud of data. Good luck and stay safe!