5 Signs of a Phishing E-Mail
by Commonwealth Financial Network
Did you know that phishing (i.e., scam) e-mails account for about 91 percent of all cyber attacks? In other words, nearly every cybersecurity issue you could think ofāfrom viruses, to ransomware, to full-blown data breachesāstarts with users accidentally clicking malicious links in e-mails.
On the technology end, we combat phishing e-mails with spam filters and antivirus scanners. But these security features arenāt perfect. Inevitably, youāll find phishing e-mails in your inbox, and the only true āpatchā is end-user awareness.
By understanding the signs of a phishing e-mailāand sharing them with your staff and clientsāyouĀ will be well positioned toĀ protect your sensitive information against cyber threats. With that in mind, letās reviewĀ five signs of a phishing e-mail and then cover what to do when youāve spotted a phish (or when you think youāve spotted a phish).
Generally, weāre familiar with the e-mails we receive. We recognize the sender or the content. But when it comes to phishing, weāre often faced with an unexpected request. Letās review a common scam to illustrate this point.
You receive an e-mail from a āfriendā stranded in a foreign country. He or she just needs a one-time wire transfer of a few thousand dollars to make it home safely.
How often does this scenario actually take place in real life? Requests like this one are unusual for a reasonāthey arenāt legitimate.
A majority of phishing e-mails prompt recipients for action ASAP; that way, there isn'tĀ time to process what you're readingĀ and doubt its veracity.
But how many times have you sent an e-mail that was actuallyĀ urgent? Typically, urgent requests are left to phone calls or in-person meetings. Urgency just doesnāt make sense for e-mail. This is one of the biggest telltale signs of a scam.
Keep an eye out for typos and strange syntaxātheyĀ areĀ common features of malicious e-mails. Most phishing e-mails are sent from foreign countries, where computer crime laws may not be as strict as they are in the U.S. Even if U.S. law enforcement tracks down an attacker, the country in which the attacker resides may not cooperate. Scammers are much safer attacking us from abroad. Fortunately, their language can be a dead giveaway.
Attackers want to convince you that youāre going to a legitimate website, when instead they are really sending you to their malicious one that could install malware on your computer or prompt you into revealing your password. So, ifĀ you hover over a link within an e-mail and the URL doesn't match the description of the link, it might be a phishing site.
WhenĀ the URL doesnāt look familiar, donāt take a chance. If the e-mail regards an online account that you log into regularly, simply open up a new browser window yourself and log in as normal. (Donāt click thatĀ link!)
Phishing e-mails often ask you to āverifyā your credit card number, social security number, or account passwordāsomething legitimate services would never ask you to do. Never (ever!) share sensitive information through e-mail.
Now that you know the signs of a phishing e-mail, what shouldĀ you do if you spot one?Ā Just delete it!Ā Many users feel the need to report phishing e-mails to their firmās Technology team, but reporting can cause a number of problems:Ā
- If a suspicious e-mail is forwarded, it increases the chances that the malicious link will beĀ clicked.
- It can hurt productivity if one person or team is trying to dissect a suspicious e-mail while another is waiting to hear back.
If we all get in the habit of recognizing and deleting suspicious e-mails, phishing will become a weaker, less impactful threat altogether.
Sometimes, detecting phishing e-mails can be tough, even when youāve seen a million before. We have two recommendations for those especially tricky situations:Ā
- Simply delete the e-mail. If an e-mail is causing you to hesitate for that long, itās usually because something is āphishy.ā Trust your gut. In the event that you accidentally delete a legitimate e-mail, the sender will get in touch with you again, at which point youāll have more information to work with.
- Verify with the sender "out of band." In other words, simply call the sender. Donāt use a number provided from the e-mail because it could be fake. If you donāt know the legitimate number, try researching the official website of the business or individual.
Many phishing e-mails tempt us with irresistible offers, but hereās a legitimate deal that no one can pass up: If we can keep the signs above in mind when checking our e-mails, we can prevent 91 percent of cyber attacks from ever getting to our networks. Following this simple plan can go a long way in securing your information.
Have you ever been a victim of a cyber attack? What preventive actions haveĀ you taken to secure your information? Please share your thoughts with us below!
Ā Commonwealth Financial Network is the nationās largest privately held independent broker/dealer-RIA. This post originally appeared on Commonwealth Independent Advisor, the firmās corporate blog.
Copyright Ā© Commonwealth Financial Network