Organizations with 20–100 employees.
Organizations with 100+ employees with an internal IT team.
Elevity is one of the largest and most capable technology management providers in the Midwest. Our team of technology experts can help you reach a truly elevated level of IT strategy, security, solutions and support.
FEATURED RESOURCE
2675 Research Park Drive
Madison, WI 53711
Organizations with 20–100 employees.
Organizations with 100+ employees with an internal IT team.
Elevity is one of the largest and most capable technology management providers in the Midwest. Our team of technology experts can help you reach a truly elevated level of IT strategy, security, solutions and support.
FEATURED RESOURCE
2675 Research Park Drive
Madison, WI 53711
By now, you probably know that a Nigerian prince isn’t offering to pay you millions in exchange for helping him get his royal fortunes out of the country — as long as you supply your bank routing number.
To many, the absurdity of this classic email hoax is laughable, but some studies have shown that people may be overconfident in their ability to detect phishing scams. Nearly all phishing attacks happen by email, and hackers are becoming more cunning and sophisticated as they evolve their tactics to deceive unaware businesses and individuals.
Keep these 10 ways to spot the latest phishing email scams for 2022 in mind:
Have you heard of this quick and easy cure for COVID-19? Or a super easy way to get money fast in these difficult days?
Probably not — and that’s likely because they simply don’t exist. Unfortunately, in tumultuous times like we’ve had the last few years, scammers are going to attempt to prey on people who are struggling, using enticing language and promises to lure them in. Watch for subject lines promoting vaccine registration or new “treatments” for COVID-19. Also, look out for any promises offering fast cash or questionable investments. Do not click on any links or fill out any official-looking forms.
Instead, go directly to your healthcare provider or the Centers for Disease Control and Prevention (CDC) website for the most current and accurate information about COVID-19, and continue to follow well-known and legitimate financial advice from real experts and any advisors you may already speak to.
An email with an attached fake invoice or other such suspicious attachment is a common type of phishing scam. Never open an attachment you weren’t expecting, even from someone you know. Don’t click, don’t tap, just close it and delete it.
If the web address URL within an email displays differently when you hover over it or appears to be misspelled based on your experience with the correct URL, it’s likely an attempt to lead you to a malicious site and hack your device.
Emails claiming that you need to update your account are classic attempts to obtain access to personal information and should raise red flags. They may appear to come from your social media accounts, credit card companies, online shopping services, payment apps, the IRS, a bank or other institution. Most institutions will never request login credentials, account numbers, financial information and other personal data via email.
Some examples of these common phishing subject lines might look like:
We all make spelling errors on occasion, but when an email is riddled with obvious grammar mistakes and poor sentence structure, it’s a clue that an email was written either by a computer program or a foreign hacker who’s not associated with a professional organization and may be making a poor attempt at using Google translate.
Look for legitimate company contact information and confirm it by separately typing it into Google (never by clicking within the email). Don’t click on any shortened links which may be trying to fool Secure Email Gateways.
Learn More: Top 10 Cybersecurity Facts
Is the formatting of the email different than usual with strange spacing or margins? Is the company logo pixelated or are the colors off? If you’ve subscribed to an email list from a reputable company and regularly receive correspondence from them, be wary if those emails suddenly show up in your inbox looking differently than they normally do.
Aside from obvious visual cues, if anything at all is giving you bad vibes — such as an unrecognized sender name or a peculiar though not obviously malicious subject line — don’t click anything or respond. When in doubt, close it out.
This scam is especially prevalent around tax season. The email may appear to come from a company’s internal HR department or high-level executive requesting an employee’s W-2 form. When released, the scammer can file fraudulent tax returns and claim any potential refunds. No one legitimate will be sending you an email requesting your W-2 form.
“Oh wow, the CEO themselves is asking me personally for a favor!” Who wouldn’t want to comply with a request from the “CEO?” Chances are, though, that request to transfer funds, pay an invoice or release sensitive information on their behalf is really coming from a scammer.
Hackers are becoming masters at researching a company’s high-level personnel and then impersonating them.
Ask yourself: Would the CEO really send a direct email asking for something like this? The answer is almost certainly “no.”
Did you actually enter a contest? No? Then, sorry to break it to you, but you’re not actually a contest winner. Don’t let whoever sent this to you win by falling for their scam.
Don’t fall for emails with a sense of urgency claiming that your “immediate action is required.” If the email claims that your account has been compromised or that the account will be closed unless you respond right away, it’s a sure sign something’s up. Instead, try logging into the account from a separate browser using your normal means of accessing it.
If you receive an email that looks suspicious, follow these phishing email best practices:
If an email appears to come from someone you know, or from an organization you’ve dealt with before, don’t reply. Instead, contact the individual or company some other way to follow up, or manually access your online account by separately entering a known URL into your browser.
Also, don’t forward a suspicious email to ask if it’s legitimate, even to your own IT department. Instead, pick up the phone or send a separate email explaining your concern. Then, delete the email, empty your trash and carry on.
Think you might have fallen for an email phishing scam? Here are some immediate steps you should take:
Better yet — avoid these attacks in the first place. At Elevity, we use our own 4S approach to protecting your technology and assets: Strategy, Security, Solutions and Support.
One such tool we have for this is our free Cybersecurity Risk Assessment. To see how prepared you are for a cyberattack, we encourage you to take the assessment. Simply click the link below and you’ll be guided through 15 critical questions and provided a security score at the end to help you figure out your next steps.
These Stories on Cybersecurity
2675 Research Park Drive
Madison, WI 53711
888.733.4060
support@elevityit.com
A Division Of