How To Identify a Phishing Email

Phishing emails are fraudulent attempts to deceive individuals into revealing sensitive information. These emails, cleverly disguised as legitimate sources, often contain links or attachments that lead to counterfeit websites or malware downloads. Falling prey to a phishing email not only compromises your security but also exposes Westmoreland to potential data breaches or cyberattacks. This highlights our crucial role in identifying and reporting phishing emails, which is integral to our organization's security.

Common Phishing Email Examples

  • Phishing emails claiming to be from company executives, asking you to verify bank details or make an emergency transfer via an unfamiliar link.
  • Emails from a sender posing as a coworker requesting that you open an attachment that may contain hidden viruses or ransomware.
  • Fake offers for free gift cards or discount coupons from well-known companies that require you to fill out a survey or provide your personal information.
  • Scammers impersonating government agencies, threatening legal action or fines if you don't pay a tax debt or comply with a request.
  • Emails from fake charities soliciting donations for a cause or disaster relief fund.

How to Identify a Phishing Email

  • Check the sender's email address and name against the official website or domain of the organization.
  • Look for spelling and grammar mistakes or unprofessional formatting in the email.
  • Don't click on any links or attachments in the email. Hover over the link to see the actual destination, or copy and paste it into a new browser tab.
  • Be wary of any email requesting your personal or financial information. Contact the organization directly using a trusted phone number or website.
  • Be alert for any email that creates a sense of urgency or pressure.

What to do When you get a Phishing Email

Phishing emails are a very common threat and eventually, everyone will receive one. It is crucial to know how to identify and respond to them to protect the organization from potential harm. By following the steps below you can significantly reduce the risk of phishing scams.

Do not click on any links, open any attachments, or reply to the sender.

  • This is important because these links may contain malicious software that could harm your computer or device. Additionally, replying to the sender may confirm that your email address is active and could result in more spam or phishing emails in the future.

Report the email to your IT department or cybersecurity team.

  • Reporting the email can help your organization take steps to prevent similar emails from being delivered to other users. Your IT department or cybersecurity team can also investigate the source of the email and take appropriate actions.

Delete the email from your inbox, trash, or junk folder, and do not forward it to anyone.

  • By deleting the email, you can prevent yourself or others from accidentally clicking on any malicious links or attachments. Forwarding the email can also spread the threat to others.

Change your passwords if you suspect that your account has been compromised.

  • If you suspect that your account has been hacked or compromised, changing your passwords can help prevent unauthorized access to your account and information. You should choose strong and unique passwords and enable two-factor authentication for added security.
100% helpful - 1 review
Print Article

Related Articles (1)

This article shows how to report a phishing email.