Tips for Spotting a Phishing Email This Christmas
As the silly season is around the corner, distracted Australians are thinking more about the upcoming festivities and taking a much-deserved break with family and friends. As they should, however, cybercriminals don’t take a break and use this time of year to take advantage of unsuspecting individuals within organisations with targeted phishing attacks.
In this blog post, we provide 5 tips for spotting a phishing email to protect yourself and your organisation during the Christmas period.
1. Check the sender email address
Often when people receive an email, they will only look at the display name i.e. Bill Gates, and not probe further to look at the email address (Bill_Gates@M1cros0ft.com). This is especially true when the display is one that is recognised. If an email or request looks unusual, the first port of call is to check the email address is correct and matches the display name.
2. Check the email format
Some attackers may use more sophisticated techniques and spoof not only the display name but the email address itself too. In these cases, you should be wary of any indications that the format of the email looks unusual. Questions you should be asking yourself are:
- Does the spacing look strange?
- Are logos displayed correctly in the sender’s signature?
- Does the email contain typos or spelling mistakes?
3. Assess the content
If the email has come from a sender you communicate with frequently, you should be asking yourself the following questions:
- Does the tone match their usual emails?
- Is the request normal or out of the blue?
- If it’s a communication from an organisation, are they requesting you to act immediately?
Financial institutions or other organisations with PCI data will contact you via phone with urgent requests and communicate through email for anything not urgent.
4. Validate URLs
Sometimes attackers may use links in their emails to hijack web browsers or direct receivers to fraudulent websites attempting to gain credentials. By hovering over links in an email you are able to see the complete address. If the address looks suspicious then the link should not be clicked on.
5. If all else fails, call the sender
If the sender is known to you but their request looks unusual, phone them to confirm the email is legitimate. It is much better to be safe than sorry, and if the request is urgent and valid it’s likely the sender will answer straight away.
Although email security may be the last thing on your mind this Christmas, you must remain vigilant to well-crafted emails that may contain malicious links. To find out more about how InfoTrust can improve your email security and create a culture of cybersecurity for your organisation, reach out to us today.
see our
Related resources
In today’s digital age, we all use a vast amount of information to conduct our business activities, sharing, and interacting with data across multiple devices and networks. As such confidentiality, integrity and availability are key. You only have to look at recent news headlines to realise that even organisations with comprehensive security strategies are still vulnerable to cybersecurity breaches. Vulnerabilities can lie within the technology being used, the cyber-awareness of its employees, and the sophistication of attacks.
During the great cloud rush, many organisations moved to various cloud environments, for the productivity advantages, improved reliability and security compared with running on premise environments. But the naysayers conveyed the risks associated of security concerns and outages, having the potential to bring down a company or even an economy if a there was a massive outage.
Based on InfoTrust analysis at the start of 2019 of over 9000 Australian company domain MX and SPF records, over a third of these organisations rely on Microsoft O365 Productivity suite.
This includes some of Australia’s largest organisations that would undoubtedly disrupt an economy if they were without email for a sustained period of time.
As you may be aware, from July 1 2019, all APRA regulated entities will be required to adhere to a new prudential standard, CPS 234. According to APRA, “this Prudential Standard aims to ensure that an APRA-regulated entity takes measures to be resilient against information security incidents (including cyber-attacks) by maintaining an information security capability commensurate with information security vulnerabilities and threats.”
Mimecast recently released its State of Email Security Report for 2021. The fifth edition of its annual report used interviews with over twelve hundred of information technology and cybersecurity professionals across the globe to gather vital cybersecurity insights. The report offers an insight into the latest email threats along with advice on how to build cyber resilience and mitigate the risks of email-borne attacks.
Last month CrowdStrike released its 2020 Global Threat Report, reflecting on the past year’s cybercrime and the types of attacks and techniques criminals have been utilising. In this blog post, we take a look at the key trends from the report and what they mean to Australian businesses.
Earlier this month the CrowdStrike® Falcon® Overwatch™ team released their 2018 mid-year review, “Observations from the Front-Lines of Threat Hunting”. InfoTrust discusses the front-line and why security is everyone’s business. A brief precis, some thought provocation, and insight (hopefully) are below.
We're Here To Help