Microage-Kingston-work-from-home-hacker-scaled

How-to Spot a Phishing Email

work-from-home-how-to-spot-a-phishing-email

How to spot a phishing email

It’s the perfect time for hackers to send e-mails with dangerous malware and viruses.  Right now, your inbox is probably filled with “COVID-19” subject lines and coronavirus-focused e-mails. 

Hackers are even using a fake cdc-gov e-mail address that’s not legitimate and spamming inboxes. 

How can you tell a phishing e-mail from a legitimate one?  Here’s a few telltale signs on how-to spot a phishing email: 

  • Look closely at the e-mail address to make sure it’s spelled correctly. 
  • Hover over any links in the e-mail (but DON’T CLICK) to see the ACTUAL website you’ll be directed to.  If there’s a mismatched or suspicious URL, delete the e-mail immediately. 
  • Watch for poor grammar and spelling errors. 
  • Never download an attachment unless you know who sent it and what it is. 

     When in doubt, call the person who supposedly sent the e-mail on the phone to verify it’s legitimate.  

    Want more tips for setting up safe Work From Home networks? Check out our free report if you liked our tips on how-to spot a phishing email. Or book a free 15 minute work from home security consultation.

    Get the most from your IT

    As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!

    Most commented posts

    In 2018, studies found that close to 60% of all cyberattacks are aimed at small and medium sized businesses. As criminals get smarter and more sophisticated, it’s never been so essential to protect businesses from cyber threats. If you own a business or are a CIO, here are five cybersecurity best practices for your company

    5 Cybersecurity Best Practices for Your Company

    In 2018, studies found that close to 60% of all cyberattacks are aimed at small and medium sized businesses. As criminals get smarter and more…

    Read More
    GDPR PIPEDA

    How to Keep Your Business Compliant with GDPR and PIPEDA Regulations

    Identity protection and data security are the buzzwords of the tech industry, with laws like GDPR and PIPEDA being put in place to protect an…

    Read More
    Industry of hacking

    The Industry Of Hacking: Understanding The Business Behind Cybercrime

    Cybercrime is big business with some hackers making massive annual profits. With the world being so dependent on technology, cybercriminals have loads of opportunities. There…

    Read More
    Create a team in Microsoft Teams

    How to Build a Team in Microsoft Teams in 10 steps

    Many organizations have started using Microsoft Teams for online meetings and chat. The fact is, in the past year, the usage of Microsoft Teams has…

    Read More

    Best Practices for Cybersecurity Awareness Training Programs

    Government agencies such as the Canadian Center for Cybersecurity (CCCS) and the National Institute of Standards and Technology (NIST) in the U.S., not to mention…

    Read More