1. Emails Insisting on Urgent Action
Emails insisting on urgent action do so to fluster or distract the target. Usually, this type of email threatens a negative consequence if the action is not taken, and targets are so keen to avoid the negative consequences that they fail to study the email for inconsistencies or indications it may be bogus.
2. Emails Containing Spelling Mistakes
Most companies now use spell-checking features in email clients or web browsers to ensure their corporate communications maintain a professional appearance. Emailspurporting to come from a professional source that contains spelling mistakes or grammatical errors should be treated with suspicion.
3. Emails with an Unfamiliar Greeting
Emails sent by friends and work colleagues usually start with an informal salutation. Those addressed to “Dear XXXXX” when that greeting is not normally used and those containing language not often used by friends and work colleagues likely originate from an attacker. These should not be actioned or replied to. Instead they should be reported to the organisation’s IT security team.
4. Inconsistencies in Email Addresses
Among other email security best practices to introduce is the random checking of senders’ email addresses – especially when an email address belonging to a regular contact is unfamiliar. By checking the sender email address against previous emails received from the same person, it is possible to detect inconsistencies.
5. Inconsistencies in Links and Domain Names
Links to malicious websites can easily be disguised as genuine links. Therefore, it is also advisable to encourage employees to hover a mouse pointer over a link in an email to see what `pops up´ as an address. If an email claims to be from a business contact, but the pop up indicates an unfamiliar website, the email is likely a phishing email.
6. Be Wary of Suspicious Attachments
File sharing in the workplace now mostly takes place via collaboration tools such as Dropbox, OneDrive or SharePoint. Therefore, emails from colleagues with file attachments should be treated suspiciously – particularly if the attached file has an unfamiliar extension or one commonly used to deliver malware payloads (.zip, .exe, .scr, etc.).
7. Emails That Seem Too Good to Be True
Emails that seem too good to be true incentivize targets to click a link or open an attachment with the promise that they will benefit by doing so. Even when phishers use social engineering to appeal to the target’s curiosity or greed, the intended targets have not usually initiated contact. These emails should be flagged as suspicious at once.
8. Emails Requesting Login Credentials, Payment Information or Other Sensitive Information
Emails requesting login credentials, payment information or other sensitive information should always be treated with caution. By adopting the anti-phishing best practices detailed above, recipients of these emails should be able to determine whether or not they represent a threat and respond to them accordingly.