Ways to Avoid Email Phishing Scams
What is Email Phishing?
Email phishing is a type of cyber attack where the attacker sends a fraudulent email to trick the recipient into revealing sensitive information, such as login credentials or financial information. Phishing emails can be very convincing and may appear to come from a legitimate source, such as a bank or a popular online service.
How to Avoid Email Phishing
- Be skeptical of emails asking for personal information. Legitimate companies will never ask you to provide sensitive information, such as passwords or credit card numbers, via email.
- Check the sender’s email address. Phishing emails often come from email addresses that look similar to legitimate ones, but with slight variations. Always double-check the sender’s email address to ensure it is legitimate.
- Don’t click on suspicious links or attachments. Phishing emails often contain links or attachments that, when clicked, can infect your computer with malware or take you to a fake website designed to steal your information. Always hover over links to see where they lead and only download attachments from trusted sources.
- Use anti-phishing software. Many anti-virus software programs now include anti-phishing features that can help protect you from phishing attacks.
- Use two-factor authentication. Two-factor authentication adds an extra layer of security to your accounts by requiring a second form of authentication, such as a text message or a fingerprint scan, in addition to your password.
- Be cautious of urgency or threatening language. Phishing emails often use urgent or threatening language to pressure you into taking immediate action. Always take a step back and carefully evaluate the email before responding.
- Trust your instincts. If an email seems suspicious, it probably is. If you’re unsure about an email, contact the sender directly to verify its legitimacy.
Contact Widomaker if you are unsure if a message is legitimate or not.
You may also forward a message (as an attachment) to Widomaker for evaluation, using these instructions.
More information about Phishing may be found here.