Struggling with Email Safety?

Another day, another email safety test from your information technology group. Warning you that if you click one of their fake emails again, you’ll have to attend a class. You’ve tried to be good on your email but sometimes in the moment of the hecticness of the day, you click on a link that is a part of your IT’s phishing email tests. But this time it’s different, you received an email from a trusted source who unknowingly had malware attached to their email that made it onto your computer when you opened the email.

You now have lost everything on the desktop of your computer due to a suspicious file located on it. So much work is lost, and not even knowing everything that will be gone until you get your computer back. There are many ways in which you can slow down your day to make sure emails are safe. Here are a few tips for understanding email phishing errors.

 

Email Safety Tips

 

1. Be Aware of Misspellings and Grammar

One of the most common phishing giveaways is incorrect spellings of common words and phrases. This could be sentences that don’t necessarily sound correct and commas and periods where they are not supposed to be. Here is an example of a sentence that could be within a phishing email:

  • “Their was a   unusual sign-in to your instagram account. Take action now!!”
  • “Hello customer!! You may be eligibl for improved Medicare #benefits or reduced monthly premiums in 2021. #Click# the link below to verify your. information so see if you qualify!”

If you are truly having a sign-in issue there would be a sentence asking if it wasn’t you to take action. When the email doesn’t look like it’s from Instagram, then there’s a good chance it’s just someone trying to steal your information. If your email has a good spam filter then emails like the second one will never make it into your inbox. But, if they do, look for sincerity in using your name in the opening and checking to see if works have weird punctuations around them.

2. External Senders

Another big flashing sign of phishing emails is from external senders. Granted in some organizational situations you will receive emails from external senders. Though you should be able to identify if someone that looks like is from your organization comes in as an external sender, it is probably not their email and therefore you shouldn’t open it. When in doubt, don’t click the email, instead reach out to someone who can confirm whether the email is safe or not.

3. Suspicious Links

Looking on, suspicious links in emails can also cause havoc to someone’s computers and systems. This is because a link can have a mask over it, meaning that it looks like a regular link but when clicked actually takes you somewhere that you shouldn’t be going. There are some practices that are important in identifying whether a link is safe or not:

  • First, evaluate overall if the email is safe or from someone you know. (it could also be a good email overall but the link could still be bad).
  • Next, look at the link and hover your mouse over it to see the actual URL of the link you are about to click. (This will show you the true destination)
  • Finally, if the destination is not the link that was linked to the email then it is a bad link. Delete the email immediately and report it as spam.

It should be noted that the same goes for email attachments. Most emails will show you previous of the things attached to your email. If you find that there is no preview and the email is overall suspicious, then it is best to delete the email and contact your IT team. Downloading the attachment risks putting malware on your computer and losing information.

For more information about email phishing and how to further protect yourself, watch the video below!

Stay Safe from Phishing and Scams

g.co/DigitalCitizenshipCourse

Want to Help?

 

Considering a job in cybersecurity and information technology could be right for you! Do you have an interest in full-time, contract, and contract-to-hire positions? Look no further, Preferred Resources, Inc, may be right for you. We offer professional staffing services for full-time, contract, and contract-to-hire positions in the technology industry. For current job openings visit our job postings page, or LinkedIn to get in contact with one of our recruiters. If you are curious about our services and interested in becoming a client of Preferred Resources contact us here!