top of page

8 Tips for User to Help Identify Phishing Emails

Updated: Jun 3

As a member of your company's workforce, you serve as the initial barrier against cybersecurity threats, with the majority originating from recognizing phishing emails. It's a fact that 25% of employees have acknowledged clicking on such emails—after all, we're only human, and errors occur. However, it's crucial to note that a staggering 91% of data breaches initiate from a phishing attack. Being informed about what to watch out for can significantly diminish the likelihood of being included in that statistic.

locks of various sizes and shapes on a fishing hook with data numbers behind all on a yelllow golden background

Below are eight key questions to consider in discerning a potential phishing attempt:


Do you recognize the sender?

When detecting phishing emails, haste can lead to your downfall, so take your time. If the sender seems unfamiliar, conduct a meticulous examination. Scrutinize both the display name and the email address. Scammers often mimic display names of banks, credit cards, and prominent retailers to appear genuine. Verify that the domain aligns with the organization's name—for instance, @microsoft might become @microsaft or @microsoft123. Additionally, cross-reference online sources for legitimate URLs.


Does the email have a generic greeting?

If you're engaged in business correspondence, expect the use of your name—it's effortless to personalize emails nowadays. If an email begins with a generic "Dear Sir or Madam," rest assured it's not from your bank or credit card company. Hackers might even skip a salutation altogether and prompt you directly to take action via a link.


Do you notice any spelling or grammatical errors?

These mistakes may stem from subpar language translations, yet they aren't always accidental. Sometimes, they're deliberately crafted to evade spam filters that screen out keywords and phrases to thwart phishing attempts. Additionally, they help sift out individuals who pay close attention to detail, making them less susceptible to falling for the bait. In essence, legitimate businesses are meticulous about their spelling.


Does the message seem urgent or threatening?

Pressuring you for a swift response is a typical tactic aimed at prompting impulsive actions. Phrases like "recent account changes" or "your package couldn't be delivered" demand immediate attention. Refrain from responding or clicking on attachments or links until you're absolutely certain that the email originates from a reliable source. If you can't ascertain its authenticity, consider reaching out to the organization through channels you trust.


Are they requesting personal information?

Avoid transmitting personal information via email—reputable companies typically refrain from making such requests. Exercise caution if they ask for sensitive details like login credentials, account numbers, or payment information.


Are the email domains consistent?

Remember to always inspect embedded links in an email by hovering your cursor over them, but refrain from clicking! If the link address doesn't correspond to the embedded link, it's likely malicious and could redirect you to a phishing site. Keep in mind, never click on a domain that lacks a URL starting with https.


Does the message contain suspicious attachments?

Malicious attachments serve as a convenient method for attackers to implant malware onto your device and extract sensitive data. Watch out for file types such as .exe, .scr, and .zip. Trusted institutions typically guide you to their website for document or file downloads—they don't typically send emails with attachments out of the blue.


Is it an urgent internal request?

Exercise caution with emails from internal sources, especially if they raise concerns such as urgent requests or solicit sensitive information. HR-related emails, particularly those involving financial verifications or changes, are common targets. When in doubt, verify the legitimacy of the sender through messaging or calling.


Concerned an email might be a phishing attempt?

Instead of simply deleting it, mark it as spam mail so your email client can learn to redirect such emails to your spam folder, preventing accidental opening in the future.

As phishing attacks grow more sophisticated, you might not always spot them. If you suspect you've fallen victim to a phishing attack, promptly notify your IT department. Don't hesitate due to embarrassment—your IT team can verify the legitimacy of the email, conduct a virus scan, and address any suspicious activity.


Should you lose sleep over phishing attempts? No. While there are numerous phishing emails circulating, antivirus programs, firewalls, and spam filters intercept most of them before reaching your inbox. You just need to remain vigilant against the few that slip through. Stay informed, exercise caution, and carefully assess what you open or click on.


Don't fall prey to scammers—reach out to MapleTronics to explore our security solutions and how we can assist in user training.

bottom of page