10 simple tips for spotting e-mail attacks (phishing and ransomware)

In this article

Today, phishing and ransomware have become the favorite weapons of cybercriminals. And their main point of entry is often... our mailbox. However, with a few simple reflexes, it's possible to thwart most of these traps. Here are 10 practical tips for spotting attempted e-mail attacks before it's too late. 

1. Always check the sender 

One of the first reflexes to adopt is to look carefully at the sender's address. Don't rely solely on the name displayed: this is often the decoy. Check the full address: cybercriminals use addresses close to the original (e.g. micros0ft.com instead of microsoft.com). Also beware of free addresses (gmail, yahoo...) for official companies. 

2. Beware of alarmist or urgent messages 

Most attacks play on fear and urgency. If the e-mail asks you to act immediately or risk account blocking, loss of access or a fine, take the time to check the message's veracity. 

3. Beware of attachments 

Attachments are classic vectors for ransomware and malware. Never open an unexpected attachment, even if it appears to come from a known contact. Be especially careful with .exe, .zip, .scr files, or Office documents with macros. 

4. Inspect links before clicking 

Before clicking on a link, hover your mouse over it to display the actual URL. Check that the domain is that of the official organization. Shortened or slightly modified links should arouse your suspicion. 

5. Watch out for spelling mistakes 

Even though attacks are becoming increasingly sophisticated, many fraudulent e-mails still contain typos, awkward turns of phrase or approximate translations. This is often a telltale sign. 

6. Never send sensitive data by e-mail 

No serious organization will ever ask you for your login details, password, credit card number or other sensitive information by e-mail. If they do, it's most likely a phishing attempt. 

7. Analyze the signature and tone of the e-mail 

The absence of an official signature, verifiable contact details or an unusual tone should tip you off. Compare it with your usual exchanges with your contact. 

8. Check content consistency 

Always ask yourself if the request makes sense: a supplier asking you to change their bank details, a colleague urgently asking you to validate a payment... Take the time to check via another channel (telephone, direct message). 

9. For those in the know: analyze the e-mail headers 

Headers contain valuable technical information about the email's path. Suspicious sending servers or unknown IP addresses can betray a spoofing attempt. 

10. Use protective tools 

Last but not least, don't overlook technical tools such as anti-phishing software, antivirus software, e-mail filters, attachment and link scanners. They are a great help in automatically detecting many threats. 

For a more in-depth assessment, don't hesitate to Contact us !

In this article

Phishia protects your business against cyberattacks.

en_US