If you’ve taken security awareness training, you have probably been taught to hover your cursor over a link to view the destination URL. Checking the URL for things like misspellings, unofficial domain names, and sneaky subdomains is a great way to protect yourself against phishing links. But, the URL could appear legitimate and still lead you to something malicious. Cybercriminals can use hijacked websites, websites that appear safe, or services like Dropbox or Google Drive to spread their phishing attacks.
While you should definitely make a habit of checking links before clicking on them, it is important to know the other red flags to look for in a suspicious email. Try examining the email by asking yourself some of the following questions:
- Is the body of the email specifically addressed to you?
- If the email starts with “Dear User” or any other vague term instead of your name, this could indicate that the email is a phishing attack that was sent to a number of other people.
- Are there obvious spelling or grammatical errors?
- Nowadays, spell checking is built into most email clients and mobile keyboards. Obvious spelling and grammatical errors could indicate that the message has been poorly translated from one language to another.
- Was the email received at a strange time?
- If the email was not sent during business hours or at a reasonable time in relation to your location, this could indicate that the sender is in another country.
- Were you expecting this email?
- For example, if the email says you have a delivery ready for pick up, think about whether or not you made a recent purchase.
- Is there a sense of urgency in the email?
- Cybercriminals love creating a sense of urgency to trick you into impulsively clicking on a link or opening an attachment. Consider phrases like “ACTION NEEDED” to be a red flag.
- Are you being asked to do something that isn’t typically part of your role?
- For example, if you are in customer service you wouldn’t typically be asked to provide information about the organization’s financial statements.
If you still struggle to determine the legitimacy of an email, try looking outside of your inbox. For example, if you receive a notification email from a service you use, open your browser and navigate to the official website. Then, log in to your account to verify the legitimacy of the notification email. Or, if you are contacted by an individual, call the sender to confirm that the email really came from that person.
Producer Update: Issue 4 – 2022
IN THIS ISSUE:
- President’s Commentary
- Cyber Corner: URLs are Only Half the Story
- Can Your Workers’ Compensation Carrier Manage Your OSHA Compliance Requirements?
- Plumb Safety: Three Common Auto Claims for Lumber Dealers
- The Dovetail: Claims Trends – Reinforcing the Need for Sound Loss Control
- A Look into PLM’s Latest A- (Excellent) Rating from AM Best
- Spotlight On: Lindsey DiGangi Appointed to AVP – Marketing
- Spotlight On: Recent Changes to PLM’s Board of Directors
- Spotlight On: Upcoming Events List
- Recent Wins