eTop University
  • 👋Welcome to eTop University: Your Learning Hub
  • About us
    • 🚀Vision, Mission & Focus
      • Vision
      • Mission
      • Focus
    • 💖Values
  • Team
    • 👋Meet the Team!
  • 📚Education
    • 🆘Self Help Guides
      • 🖱️Three things to fix your computer
      • 📃Change the Default Application
      • 🎒Backups!
        • Windows Server - Previous Versions
        • OneDrive for Business Versions
      • Microsoft 365 Guides!
        • The Art of the Microsoft Minute: A Humorous Guide for eTop Users
        • 📉PowerBI License Association
        • ☁️OneDrive for Business
          • 📂OneDrive Files On-Demand
          • 📁Known Folder Move
          • 🤝File sharing with OneDrive
          • 🔁SharePoint Sync
        • 📆Microsoft Teams
          • 📅Using Teams
          • 🆕New Teams/Old Teams
        • ➡️Microsoft Authenticator
          • 🔐Verify your Authentication methods
        • 📩Outlook
          • 🔐Managing Quarantine
          • 🚩Report messages to Microsoft
          • 🗓️Shared Calendars
          • 📱Outlook Mobile Setup
            • 📥iOS setup
            • ✉️Android Setup
          • 🤝Accessing Another Mailbox
          • 🗄️Online Archiving
        • 📆Microsoft Bookings
          • Create a Booking Page
          • Public and Private Bookings
          • 🤙Schedule a meeting with Bookings
        • 📲Mobile Phone Setup
          • Microsoft Company Portal
          • 📱Android Phone Setup
          • 📱iOS Phone Setup
          • Microsoft Company Portal
      • 💲QuickBooks Troubleshooting
      • Browser Help
        • ↗️Open a page in Internet Explorer
        • Setting up Microsoft Edge Sync
        • 🔖Migrating Bookmarks to Microsoft Edge
        • 🎁Extensions in Microsoft Edge
      • 🔧eTop Tools
        • 📯Secure Remote Connection
          • 👩‍💻Sophos Connect VPN
          • 🌨️Cloudflare ZTNA Info
          • 💻Screen Connect
            • 🔑Reset your ScreenConnect Password
            • ScreenConnect on MacOS
        • 🔨Deployed Tools
          • 🗝️Keeper - Getting Started
          • ⌚AutoElevate
          • ◽UBlock - Origin Ad Blocker
          • 📨Sophos Email - Self Service Portal
      • 🎣How to spot a Phish
      • 🛣️Remote Applications
      • 🧾Password Manager
      • 🖊️Exclaimer Cloud -synchronized signatures
        • Using Exclaimer
    • ⚙️Welcome to Working with eTop
      • 📭eMail - Helpdesk@etoptechnology.com
      • 📱Phone Call - 951-398-0021
      • Page
      • 🆘Helpdesk Buttons!
        • 🔘How to HDB!
      • 🎫eTop Ticket Forms
    • 🆙eTop- Process!
      • When to Escalate a Ticket
      • 📋Client User Onboarding
      • 📋User Offboarding
      • 🏁Prospect Onboarding
    • 🌐Global Client Updates
      • 🔬Microsoft Issues
        • Some users may experience multiple issues with their Microsoft Teams TM710344
      • 🛑Bad Patch Update
      • 📮New sender rules when sending to Yahoo and Gmail
  • 📺Media - Education!
    • 📻Podcast - Business Tech Playbook
    • 📹Youtube Education!
  • 🔒Security - Insights
    • Security Practices
      • Important Notice on Password Security Practices
    • 👨‍⚖️CISA - Briefs
      • NSA, FBI, and CISA Release Cybersecurity Information Sheet on Deepfake Threats
      • 🔐Oct 3 Secure our World!
  • Policies
    • 🌴Policies
      • 💻Endpoint Procurement
      • 🔓Multi Factor
      • 🗄️Online Archiving
      • 🔧Patching
        • ImmyBot Maintenance Emails
      • ⬆️Culture of Security
        • 🔐Terminology Guide
        • 🕵️EDR
Powered by GitBook
On this page
  • 3 ways to spot a Phishing email
  • What to do if you suspect an email you received is phishing

Was this helpful?

  1. Education
  2. Self Help Guides

How to spot a Phish

Information on the best way to determine if the email you received is a phishing email

PreviousSophos Email - Self Service PortalNextRemote Applications

Last updated 6 months ago

Was this helpful?

Understanding Phishing

Phishing is a deceptive practice where fraudsters send emails or messages that appear to be from reputable sources. The aim is to trick individuals into revealing personal information, such as passwords and credit card numbers.

How Phishing Works

Phishing attempts usually involve the fraudster posing as a trustworthy entity. The target receives a message that prompts them to take an action, such as clicking a link or providing sensitive information, often leading to identity theft or financial loss.

Common Types of Phishing Attacks

  • Email Phishing: The most common form, where emails are sent to many individuals with the intent to scam unsuspecting victims.

  • Spear Phishing: More targeted, where specific individuals or companies are chosen due to their access to sensitive information.

  • Whaling: A type of spear phishing that targets high-profile individuals like executives.

  • Smishing and Vishing: Phishing conducted through SMS text messages (smishing) or phone calls (vishing).

3 ways to spot a Phishing email

1. Check the Sender's Email Address

Examine the sender's email address carefully. Phishing emails often come from addresses that appear legitimate at first glance but may have subtle misspellings or use a different domain.

For example: mary@mainstbamk.com is not the same as mary@mainstbank.com

2. Is it real?

If the service or request is unfamiliar to you but it's asking you to click a link or provide payment or information, or if the message is too good to be true, it is likely phishing. For example, if you receive an email supposedly from Zoom but you do not use Zoom, it's phishing.

3. Be Wary of Unsolicited Attachments or Links

Be cautious if the email encourages you to download an attachment or click on a link, especially if it creates a sense of urgency or invokes fear. Verify the legitimacy of the email before taking any action.

What to do if you suspect an email you received is phishing

If you suspect the email might be legitimate, but you were not expecting it, contact the sender via phone/in person. This will give you the most accurate information. If you suspect it is phishing, you can report it using Outlook.

More information:

📚
🆘
🎣
https://support.microsoft.com/en-us/windows/protect-yourself-from-phishing-0c7ea947-ba98-3bd9-7184-430e1f860a44