How to Protect Yourself from Phishing (2024)

Updated July 25th, 2022

What is Phishing?

Phishing is when someone contacts you through email, by phone, or through text message pretending to be a legitimate business.

Phishing doesn’t require any hacking because the criminals get what they need directly from their target by posing as a trustworthy entity (such as your bank, phone company, etc.) and contacting you through channels such as email, over the phone, or through text messages. They just ask you to provide information like your online account login and password, your card number or PIN, even your social security number!

You might think that you would never give out your information to someone like this, but In 2021, 83% of organizations reported experiencing phishing attacks, with an additional six billion attacks expected to occur in 2022.

Four types of Phishing Attacks:

  • Email Phishing – The most common way that phishing attacks are sent, phishing emails are designed to trick people to give out personal and sensitive information and often targets a broad group or category versus a specific individual.
  • Spear Phishing– Is a type of email scam that is even more targeted than general phishing emails as it appears to come from a known sender (such as a boss, work colleague, trusted brand, etc.)
  • Whaling–Is a form of spear phishing that exclusively targets high-ranking individuals in an organization. Whaling often targets CEOs, CFOs and other high-level executives.
  • Angler Phishing – is a new phishing scam that uses social media platforms where the attackers disguise themselves as customer service agents. They often target disgruntled employees or unhappy customers.

What are common indicators of Phishing Emails?

One of the common ways that criminals try to get your personal information is through a phishing email. These emails often have some telltale signs that they are in fact phishing scams and should be avoided at all costs.

Phishing emails generally contain suspicious links or attachments

If you do not know who the send of your email is, then you should not open any of the attachments in that email or click any of the links provided. The messages often come with a sense of urgnecy as to why you should open the attachments or click the link. Tip: To check if the link is valid, hover over a link to see the address of that link and if it matches up to the address of the email sender. Best practice is to delete the email immediately and report those phishing scams or anything that seems suspicious

Phishing Emails often have Misspellings

One key indicator of a phishing email has to do with the presence of misspellings or typos. Why is this so often true? Well, perhaps the sender is not a native English speaker, and thus the odds for typos is much higher. Or perhaps these mistakes are intentional. These “mistakes” might very well be a key phishing strategy in order to get past the spam filters in your email account. Since spam filters often look for certain words and phrases, by misspelling keywords it would allow these phishing messages to get through to Inboxes more so than a correctly drafted message would.

Phishing emails often request your personal information

The goal of phishing is to gain access to your personal information and possibly use it to steal your identity, steal your money, or even install malware onto your computer. Because of this, most phishing emails request your personal information in many unassuming ways and often put a sense of urgency in their request. These emails might appear to come from your bank (or other financial institution) and tell you that your account has been hacked. They might appear to be from a streaming service that you belong to (i.e.-Netflix, Hulu, etc.) and tell you that your credit card needs updating “immediately” or your access will be “terminated”. They might even appear to come from your insurance company and tell you that you owe (and must “immediately pay”) a very large bill.

Sense of Urgency

Phishing attempts often contain some sort of “urgent” request and require that you make an action “Now” or “Open Immediately”? This is all in the attempt to invoke a sense of panic and try to get you to take action soon.

If you have any doubts if an email is legitimate, it’s always best to contact the company directly to inquire if they were the ones who in fact sent it to you.

Ways that you can avoid Phishing scams and protect yourself from Identity Theft

  • Never give your information out to anyone who contacts you out of the blue.
  • Use a security software on your computer to help protect yourself from phishing.
  • Make sure your password isn’t easy to figure out. Use a combination of letters, numbers and symbols. Multi-factor authentication is an even better way to keep yourself protected from phishing scams.
  • Also, never use the same login information on your financial accounts that you do on other accounts like email or shopping sites.
  • Finally, report suspicious phishing activity. Contact IdentityTheft.gov if you think someone has your sensitive information, and they can guide you on the best steps to take to help protect yourself from identity theft

For more on phishing and how to keep your information secure, visit the Netspend Security Center.

How to Protect Yourself from Phishing (2024)

FAQs

How can you stay safe from phishing? ›

Use anti-phishing protection and anti-spam software to protect yourself when malicious messages slip through to your computer. Anti-malware is included to prevent other types of threats. Similar to anti-spam software, anti-malware software is programmed by security researchers to spot even the stealthiest malware.

What is the best defense against phishing? ›

Provide Security Awareness Training

Providing training to boost security awareness can be an effective way to protect against phishing attacks because it helps employees understand the risks of phishing and how to recognize and prevent these attacks.

Which of these is the best way of protecting yourself from phishing? ›

Avoid phishing scams:
  • Add spam filters to your email.
  • Never email personal or financial information without proper security protocols.
  • Do not respond to messages seeking personal information via email.
  • Call the sender directly to verify if a message you received is legitimate.

What is the prevention method for phishing? ›

Never provide your personal information in response to an unsolicited request, whether it is over the phone or over the Internet. Emails and Internet pages created by phishers may look exactly like the real thing. They may even have a fake padlock icon that ordinarily is used to denote a secure site.

What is one way to avoid being phished? ›

Do not click on links in emails, and never go to websites by clicking links in emails. This is because such a link may direct you to a fraudulent website. Instead, if you frequently visit the website the phisher is mimicking, always type the correct URL directly into your browser, or use a bookmark to access it.

How do you know if you have been phished? ›

Here are some ways to recognize a phishing email: Urgent call to action or threats - Be suspicious of emails and Teams messages that claim you must click, call, or open an attachment immediately. Often, they'll claim you have to act now to claim a reward or avoid a penalty.

How do I stop phishing emails? ›

How to get rid of spam emails
  1. Mark as spam. ...
  2. Delete spam emails. ...
  3. Keep your email address private. ...
  4. Use a third-party spam filter. ...
  5. Change your email address. ...
  6. Unsubscribe from email lists.

What is the first line of Defence against phishing attacks? ›

Vigilance is the first line of defence against phishing scams. Be wary of unsolicited emails, messages, or phone calls, especially those requesting sensitive information or urging immediate action. It probably is if something seems suspicious or too good to be true.

What information does a scammer need to access my bank account? ›

The easiest way to become a victim of a bank scam is to share your banking info — e.g., account numbers, PIN codes, social security number — with someone you don't know well and trust. If someone asks for sensitive banking details, proceed with caution.

How can I protect myself from phone phishing? ›

Don't open suspicious links. Check the email address of the sender. Remember, no reputable company or authority will ask for personal information through email or SMS. If you receive a suspicious text message, check if it's safe for free with F‑Secure Text Message Checker.

What do most phishing attacks try to get to? ›

A phishing attack is a type of cyber attack that uses social engineering tactics to steal sensitive information from victims. Most successful attacks trick users into opening malicious links or files by appearing to come from a reputable source.

How to check if it's a phishing email? ›

How can I tell if an email is phishing?
  1. Suspicious sender address. Check the sender's address carefully and make sure it's really coming from who it says it's coming from.
  2. Spoofed web links. ...
  3. Spelling, grammar, and layout. ...
  4. Suspicious attachments. ...
  5. Threats or a false sense of urgency. ...
  6. Generic salutation.

How are people targeted in phishing? ›

Targeted phishing threats are an elevated form of phishing virus attacks that use social engineering to get a specific person to reveal sensitive information. Targeted phishing attacks succeed by using information gleaned from social websites and other sources to create a sense of familiarity.

What is phishing and how can it be prevented? ›

Phishing is a type of social engineering and cybersecurity attack where the attacker impersonates someone else via email or other electronic communication methods, including social networks and Short Message Service (SMS) text messages, to reveal sensitive information.

What are the actions against phishing? ›

Filter or block incoming phishing emails

Emails should be filtered/blocked for spam, phishing and malware before they reach your users. Ideally this should be done on the server, but it can also be done on devices (ie in the mail client).

References

Top Articles
Latest Posts
Article information

Author: Manual Maggio

Last Updated:

Views: 6059

Rating: 4.9 / 5 (69 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Manual Maggio

Birthday: 1998-01-20

Address: 359 Kelvin Stream, Lake Eldonview, MT 33517-1242

Phone: +577037762465

Job: Product Hospitality Supervisor

Hobby: Gardening, Web surfing, Video gaming, Amateur radio, Flag Football, Reading, Table tennis

Introduction: My name is Manual Maggio, I am a thankful, tender, adventurous, delightful, fantastic, proud, graceful person who loves writing and wants to share my knowledge and understanding with you.