


 

   {"id":449,"date":"2021-04-26T11:00:24","date_gmt":"2021-04-26T18:00:24","guid":{"rendered":"https:\/\/easeenet.com\/blog\/?p=449"},"modified":"2021-08-04T16:28:06","modified_gmt":"2021-08-04T23:28:06","slug":"techy-tips-7-ways-to-spot-a-phishing-email","status":"publish","type":"post","link":"https:\/\/easeenet.com\/blog\/techy-tips-7-ways-to-spot-a-phishing-email\/","title":{"rendered":"Techy Tips: 7 ways to spot a phishing email"},"content":{"rendered":"\n<p><em>By Rachel Sommer <strong><sup>.<\/sup><\/strong> April 26, 2021<\/em><\/p>\n\n\n\n<p>We all know junk emails can be annoying but they can also be <em>dangerous<\/em>, find out the difference between spam and phishing emails and how to prevent falling victim to these scams. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1000\" height=\"500\" src=\"https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/AdobeStock_204077439-1000x500-1.jpg\" alt=\"\" class=\"wp-image-451\" srcset=\"https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/AdobeStock_204077439-1000x500-1.jpg 1000w, https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/AdobeStock_204077439-1000x500-1-300x150.jpg 300w, https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/AdobeStock_204077439-1000x500-1-768x384.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<h2>Spam vs Phishing<\/h2>\n\n\n\n<p>So what is Phishing? Whereas&nbsp;<strong>spam<\/strong>&nbsp;is simply <em>unwanted<\/em> mail,&nbsp;<strong>phishing<\/strong>&nbsp;is expressly designed to actually cause harm to a company or individual by obtaining sensitive information. It often takes the form of a seemingly legitimate-looking message from a trusted sender.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>There tends to be an increase in these types of emails around tax season, so it is in your best interest that you be extra careful about how you access your accounts during this time.<\/p><\/blockquote><\/figure>\n\n\n\n<h3>7 ways to spot a phishing email<\/h3>\n\n\n\n<p><strong>1. Emails Demanding Urgent Action<\/strong><br>Most scam emails are designed to make you panic. This may be the most common tactic used by scammers as it is very effective. The email may claim that your account has been compromised and the only way to verify it is to enter your login details or that your account will be closed if you do not act immediately. It&#8217;s easy to worry or stressed when you receive this kind of message. Ensure that you take the time to really think about whether an email is <em>asking something reasonable of you.<\/em> <\/p>\n\n\n\n<p>Keep an eye out for emails requesting you to confirm personal information that you would never usually provide, such as banking details or your Social Security number. If you\u2019re unsure, contact the company through their official website or customer service phone number. Do not reply or click any links and if you think there\u2019s a possibility that the email is genuine, you should contact the organization directly \u2013 do not use any communication method provided in the email. Finally, NEVER EVER give out a two-factor authentication code from a website to ANYONE, even if they say they\u2019re with that company.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"683\" src=\"https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/jay-wennington-2250-1024x683-1.jpg\" alt=\"\" class=\"wp-image-414\" srcset=\"https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/jay-wennington-2250-1024x683-1.jpg 1024w, https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/jay-wennington-2250-1024x683-1-300x200.jpg 300w, https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/jay-wennington-2250-1024x683-1-768x512.jpg 768w, https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/jay-wennington-2250-1024x683-1-24x16.jpg 24w, https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/jay-wennington-2250-1024x683-1-36x24.jpg 36w, https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/jay-wennington-2250-1024x683-1-48x32.jpg 48w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>2.<\/strong> <strong> Unusual email addresses<\/strong><\/p>\n\n\n\n<p>Inconsistencies in email addresses, links &amp; domain names are a dead giveaway. Look closely at the sender of emails, and any typos in an email, as they can be indicators of phishing schemes. Legitament companies have their own domain emails. Don\u2019t just check the name of the person sending you the email, make sure to also check their email address by hovering your mouse over (or clicking) the \u2018from\u2019 address. Make sure there are no additional numbers or letters to the address. <\/p>\n\n\n\n<p>As an example, Check out the difference between these two email addresses: <strong>david@wellsfargo.com<\/strong> and <strong>david@w3llsfargo.com<\/strong> <\/p>\n\n\n\n<p><strong>3.<\/strong> <strong>Check the logo<\/strong><\/p>\n\n\n\n<p>Also, be sure to study the logo, almost every email sent out by a legitimate company will have their logo on it somewhere and at a cursory glance the scammers&#8217; version may look the same but there&#8217;s usually a way to spot the difference.<\/p>\n\n\n\n<figure class=\"wp-block-gallery columns-1 is-cropped\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"1024\" height=\"819\" src=\"https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/Blue-Raindrops-Pug-Close-up-Pet-Photo-Collage-1024x819.png\" alt=\"\" data-id=\"456\" data-full-url=\"https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/Blue-Raindrops-Pug-Close-up-Pet-Photo-Collage.png\" data-link=\"https:\/\/easeenet.com\/blog\/?attachment_id=456\" class=\"wp-image-456\" srcset=\"https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/Blue-Raindrops-Pug-Close-up-Pet-Photo-Collage-1024x819.png 1024w, https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/Blue-Raindrops-Pug-Close-up-Pet-Photo-Collage-300x240.png 300w, https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/Blue-Raindrops-Pug-Close-up-Pet-Photo-Collage-768x614.png 768w, https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/Blue-Raindrops-Pug-Close-up-Pet-Photo-Collage-1536x1229.png 1536w, https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/Blue-Raindrops-Pug-Close-up-Pet-Photo-Collage.png 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><\/ul><\/figure>\n\n\n\n<p><strong>4. Too Good to Be True Emails<\/strong><\/p>\n\n\n\n<p>Many great promotions and sales wind up in your inbox but as the old adage says, if something seems <a href=\"https:\/\/easeenet.com\/blog\/elder-fraud-complete-guide-preventing-elder-scams\/\">too be good to be true<\/a>, it probably is. Beware of emails claiming there will be a reward of some kind when the recipient clicks on a link or opens an attachment. If the sender of the email is unfamiliar or you did not initiate the contact, then this is probably a phishing email, especially if it is directed as a &#8220;Limited time offer&#8221; and lots of emphatic language is used to illustrate a time-sensitive offer. <\/p>\n\n\n\n<p><strong>5. Bad Grammar &amp; Spelling Mistakes<\/strong><\/p>\n\n\n\n<p>Bad grammar is possibly the easiest way to recognize a scammy email. An email from a legitimate organization should be well written and professional. Fun fact \u2013 Using bad grammar is actually a strategic tactic utilized by hackers. They prey on the uneducated believing them to be easier targets.<\/p>\n\n\n\n<p><strong>6. The entire email links to a website<\/strong><\/p>\n\n\n\n<p>Sometimes phishing emails are coded entirely as a hyperlink. Therefore, clicking accidentally or deliberately anywhere in the email will open a fake web page, or automatically download spam onto your computer. You can decipher if the entire email is one hyperlink by hovering over the images, if your cursor turns into a hand over the entire content of the email and not just over the buttons then that means the entire image is a hyperlink and it is possible that it is phishing. This is not a foolproof method of determining fraud but should be used in addition to the other tips in this article.<\/p>\n\n\n\n<p><strong>7. Emails with Suspicious Attachments<\/strong><\/p>\n\n\n\n<p>Unexpected emails with attachments should always be treated suspiciously \u2013 especially if they have an unfamiliar extension or one commonly associated with malware (.zip, .exe, .scr, etc.). Typically, authentic institutions don\u2019t randomly send you emails with attachments but instead direct you to download documents or files on their own website. When in doubt, contact the company directly using contact information obtained from a letter or their actual website.<\/p>\n\n\n\n<h3>How you can keep your account safe<\/h3>\n\n\n\n<p><strong>When in doubt, throw it out<\/strong>: Links in emails, social media posts, and online advertising are often how cybercriminals try to steal your personal information. Even if you know the source, if something looks suspicious, delete it and <em>report it as spam or phishing.<\/em> Additionally, <strong>never respond to spam messages<\/strong> because, through this, the spammer will know that the email address is active and thus, it increases the chance of your email being constantly targeted by the spammer.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"318\" height=\"474\" src=\"https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/new-gmail-report-phishing.png\" alt=\"\" class=\"wp-image-450\" srcset=\"https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/new-gmail-report-phishing.png 318w, https:\/\/easeenet.com\/blog\/wp-content\/uploads\/2021\/04\/new-gmail-report-phishing-201x300.png 201w\" sizes=\"(max-width: 318px) 100vw, 318px\" \/><\/figure>\n\n\n\n<p>Only download apps from <strong>Google Play<\/strong> or the <strong>Apple App Store<\/strong>.<br>Always navigate <em>directly<\/em> to the app or websites to access your account and download any forms directly from the official website.<\/p>\n\n\n\n<ul><li><strong>If you\u2019re concerned about your account\u2019s security, you can:<\/strong><\/li><li>Manually check for and remove any devices you don\u2019t recognize from your mobile app: <strong>Account &gt; Settings &gt; Your Devices<\/strong><\/li><li>Reset your password to a <a href=\"https:\/\/easeenet.com\/blog\/improving-your-password-security\/\">strong and unique password<\/a> that you\u2019ll only use for that specific account<\/li><li><strong>Enable Two Factor Authentication<\/strong> on your account: Account &gt; Settings &gt; Two-Factor Authentication<\/li><\/ul>\n\n\n\n<p>Most email providers are generally pretty good about automatically sorting suspicious emails into the spam folder. However, you can take an extra step by installing a trusted <a href=\"https:\/\/windowsreport.com\/antivirus-with-antispam\/#:~:text=BullGuard,a%20spam%20or%20phishing%20attempt.\">antivirus software program<\/a>.<\/p>\n\n\n\n<h3><strong>Easeenet Keeps you Safe<\/strong><\/h3>\n\n\n\n<p>Easeenet helps protect you online and will never autofill your login credentials to a website, not in your saved Passwords Vault. So even if you click on an email and the website turns out to be spam, Easeenet detects this and keeps you safe! <\/p>\n\n\n\n<p>Learn more today by starting your free 14 day trial!<\/p>\n\n\n\n<div class=\"wp-block-buttons aligncenter\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.easeenet.com\/how-it-works\">Learn More<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.easeenet.com\/plans\/#registration\">Get Started<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We all know junk emails can be annoying but they can also be dangerous, find out the difference between spam and phishing emails and how to prevent falling victim to these scams. <\/p>\n","protected":false},"author":5,"featured_media":453,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[14],"tags":[83,6,10,45,57,55,28,95,94,97,54],"_links":{"self":[{"href":"https:\/\/easeenet.com\/blog\/wp-json\/wp\/v2\/posts\/449"}],"collection":[{"href":"https:\/\/easeenet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easeenet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easeenet.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/easeenet.com\/blog\/wp-json\/wp\/v2\/comments?post=449"}],"version-history":[{"count":5,"href":"https:\/\/easeenet.com\/blog\/wp-json\/wp\/v2\/posts\/449\/revisions"}],"predecessor-version":[{"id":558,"href":"https:\/\/easeenet.com\/blog\/wp-json\/wp\/v2\/posts\/449\/revisions\/558"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easeenet.com\/blog\/wp-json\/wp\/v2\/media\/453"}],"wp:attachment":[{"href":"https:\/\/easeenet.com\/blog\/wp-json\/wp\/v2\/media?parent=449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easeenet.com\/blog\/wp-json\/wp\/v2\/categories?post=449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easeenet.com\/blog\/wp-json\/wp\/v2\/tags?post=449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}