Microage-Kingston-work-from-home-hacker-scaled

How-to Spot a Phishing Email

work-from-home-how-to-spot-a-phishing-email

How to spot a phishing email

It’s the perfect time for hackers to send e-mails with dangerous malware and viruses.  Right now, your inbox is probably filled with “COVID-19” subject lines and coronavirus-focused e-mails. 

Hackers are even using a fake cdc-gov e-mail address that’s not legitimate and spamming inboxes. 

How can you tell a phishing e-mail from a legitimate one?  Here’s a few telltale signs on how-to spot a phishing email: 

  • Look closely at the e-mail address to make sure it’s spelled correctly. 
  • Hover over any links in the e-mail (but DON’T CLICK) to see the ACTUAL website you’ll be directed to.  If there’s a mismatched or suspicious URL, delete the e-mail immediately. 
  • Watch for poor grammar and spelling errors. 
  • Never download an attachment unless you know who sent it and what it is. 

     When in doubt, call the person who supposedly sent the e-mail on the phone to verify it’s legitimate.  

    Want more tips for setting up safe Work From Home networks? Check out our free report if you liked our tips on how-to spot a phishing email. Or book a free 15 minute work from home security consultation.

    Get the most from your IT

    As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!

    Most commented posts

    10 Keyboard Shortcuts That Work in Chrome, Edge, and Firefox Browsers

    You can use many of the same keyboard shortcuts when working in Google Chrome, Microsoft Edge, and Mozilla Firefox web browsers. Here are 10 keyboard shortcuts that are handy as well as easy to remember.

    Read More

    Disinfect Your Devices

    How to disinfect your devices and maintain a healthy work environment. MicroAge is dedicated to providing our clients with market-leading business solutions that help them…

    Read More
    remote-work-it-security

    Rethinking Your IT With A Decentralized Workforce – Chapter 1 : Security

    With an increasingly remote or hybrid workforce, we must rethink the way you look at your IT. Let’s first examine network security and how to…

    Read More
    8 actions to avoid ransomware

    8 Actions Your Business Can Take Now to Avoid Paying a Ransom Later

    The number of ransomware attacks have exploded in 2021. The month of July started out with a big bang when cybercriminals encrypted the data in…

    Read More
    Microsoft365-vs-AzureVirtualDesktop

    Azure Virtual Desktop vs Windows 365: What is the Difference?

    As we mentioned in a previous blog Desktop as a Service (DaaS) is a cloud-based offering where the backend is hosted by a third party….

    Read More