Click me

How to Detect a Phishing Email

How to Detect a Phishing Email Around 500 million phishing emails are sent per day and they are effective. Every 60 seconds, 250 computers are hacked. These breaches cost companies $388 billion a year in stolen business secrets and intellectual property. Here is what to look for to avoid getting phished. The Anatomy of a Phishing Email From: System Administrator 1 Emails sent from public email addresses. Subject: Email Account to be deactivated due to suspicious activity O 2 Unsolicited attachments. Dear User, 3 Generic greetings. 4 Spelling and grammar mistakes. This email is to infrom you that you email accont is about to be de-activated by your Sys Admin due to an unusual activity detected on your mailbox. To re-activate your mailbox please click on the link below or fill out the attached form. Re-Active Mail Box Nown 5 Links to unrecognized sites or slightly misspelled sites. Regards, System Administrator Note: If your mailbox remains de-activated for five days, it will be deleted. Respond + now to avoid these things. Threats or enticements that create a sense of urgency. 7 Toll free numbers in suspicious emails that do not match known numbers. Contact Support: 1-800-555-0100 + What to Do O Never give out personal or sensitive information based on an email request. ® Don't trust links or attachments in unsolicited emails. ® Hover over links in email messages to verify a link's actual destination, even if the link comes from a trusted source. @ Type in website addresses, rather than using links from unsolicited emails. © Be suspicious of phone numbers in emails. Use the phone number found on your card or statement or in a trusted directory instead. Phishing By the Numbers 91% of cyber-attacks begin with a spear phishing email. 94% of spear phishing emails use malicious file attachments What Is Phishing? Phishers typically create fake emails that appear to come from someone you trust, such as a bank, credit card company, or a popular website. These emails typically try to trick you into giving away sensitive information, such as your username, password, or credit card details. They may also try to get you to inadvertently install malicious programs on your computer, which can happen when you click on an infected link or open an infected attachment. Once infect- ed, the phisher can monitor all of your activity, including all of your keystrokes. inspired elearning Copyright ©2013 Inspired elearning Inc. All Rights Reserved. education for your enterprise

How to Detect a Phishing Email

shared by Brianreediel on Aug 28
Millions of phishing emails are sent out everyday disguising themselves as messages from trusted sources. However, these emails have malicious intent and clicking on their links or downloading their a...


Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy


Click the code to copy
Customize size