Phishing & Email Security
Recognize common phishing tactics and secure your email communications against scams and social engineering attacks.
Key Practices
- Identifying phishing emails: Look for suspicious sender addresses, generic greetings, urgent or threatening language, and spelling or grammar mistakes.
- Suspicious link detection: Hover over links to verify the destination before clicking, and use link scanners to inspect unknown URLs.
- Email attachment safety: Do not open attachments from unknown sources; scan attachments with antivirus software before opening.
- Business email compromise (BEC): Understand common BEC scams targeting employees and executives, and verify requests for sensitive information or funds through a secondary channel.
Phishing attacks rely on urgency and deception. Pause before responding to unexpected emails, and always confirm the authenticity of requests—especially those involving sensitive information or financial transactions.