Not everyone knows how to identify a phishing attack and that can lead to issues for businesses their customers. Here are just a few ways that exploiters will try to attack so that you can protect yourself.
Via eMail
* The electronic correspondence is sent from a public email address.
* The electronic correspondence has unrelated attachments.
* The electronic correspondence requests a quick response.
* The electronic correspondence has unfamiliar links.
* The electronic correspondence has poor spelling and grammar.
* The electronic correspondence has a different reply-to address.
* The electronic correspondence has no text to bypass filters.
* The electronic correspondence has old or no company logo.