...
Recognizing phishing emails. How do you do that?
saferule image
Deel
Inhoudsopgave

Phishing is a common tactic in cybercrime, with which cybercriminals try to steal personal information or passwords. They usually do this by sending official-looking messages that ask you to click on a link in the email. The site – which secretly does not belong to the company in question – then asks you to enter login details or other sensitive information. Make sure you do not fall prey to these practices by applying the  
SAFE rule: an acronym that can help you check incoming messages for legitimacy.

The SAFE rule

S – Writing style

Always read messages you receive carefully. Do you see any strange spelling mistakes? Oddly constructed sentences? Trust your gut: if there are a lot of mistakes or the message is written strangely, you are probably dealing with a phishing email.

A – Sender

Always double-check where the email came from. Not just the name on it, but the actual email address. Phishing emails often come from random email addresses, such as nhrpa1rth@t0ws.com. And even if the email address looks legitimate, it pays to double-check. For example, we send emails from addresses that end with @master-solutions.nl. Now copy-paste that into a word processor and change the font. See? One of those L’s is actually a capital i. Be aware that cybercriminals use these kinds of tactics to trick you.

F – Fake Link

If you have any doubts about the legitimacy of a message,  never  open an attachment or link in the message. You can easily check links by hovering over them and looking at the bottom left of the screen. There you will see the address the link will take you to. If the link takes you to a website you don’t know or that isn’t officially from a company (Google is your friend here!), don’t click on it.

E – ePrivacy

Remember: Legitimate, trusted companies will  never  directly ask you for personal or login information. So if you receive a message asking you to give up this information, you are almost certainly dealing with a phishing attempt.

Being aware of techniques to steal your (personal) information is one of the most important skills you can have, because most hacks and information leaks can be traced back to ‘Social Engineering’: abusing the human tendency to trust. Now you are at least aware of what to look out for.

Gepubliceerd:+October 25, 2024
Geschreven door
admin
Vond je dit artikel leuk?
Sluit je aan bij onze community van 3 miljoen mensen en blijf elke week op de hoogte. We hebben nog veel meer speciaal voor jou! Laten we ons nu aansluiten

Leave a Reply

Your email address will not be published. Required fields are marked *

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.