Identify a Phishing Attack

Not everyone knows how to identify a phishing attack and that can lead to issues for businesses their customers. Here are just a few ways that exploiters will try to attack so that you can protect yourself.

Via eMail
* The electronic correspondence is sent from a public email address.
* The electronic correspondence has unrelated attachments.
* The electronic correspondence requests a quick response.
* The electronic correspondence has unfamiliar links.
* The electronic correspondence has poor spelling and grammar.
* The electronic correspondence has a different reply-to address.
* The electronic correspondence has no text to bypass filters.
* The electronic correspondence has old or no company logo.

The following two tabs change content below.
facebook-profile-picture

Stephan Pringle

Technology Support Specialist at Sipylus
About The Author: Stephan Pringle is an Information Technology Support Specialist. He covers hardware and software and provides tips for you to troubleshoot and repair issues on your own. In his spare time, he writes articles about the State of New York on his Hackintosh and HackBook and that has helped him to become the top contributor of the New York City section of Yahoo! Answers.
facebook-profile-picture

Latest posts by Stephan Pringle (see all)

facebook-profile-picture

Stephan Pringle

About The Author: Stephan Pringle is an Information Technology Support Specialist. He covers hardware and software and provides tips for you to troubleshoot and repair issues on your own. In his spare time, he writes articles about the State of New York on his Hackintosh and HackBook and that has helped him to become the top contributor of the New York City section of Yahoo! Answers.