"Moving to E5 has been really good from a security point of view... Now we can get a holistic view of what’s going on, which helps us to make changes and recommendations for future plans."
IT Service Manager
Ian Harkess
Trusted by industry leaders
Kickstart Your FastTrack Journey
Fill out the short form below to express your interest in our FastTrack programme, and we’ll be in touch soon.
Please note: A minimum of 150 enterprise licenses is required for FastTrack eligibility.
“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”
IT Operations Manager
Simon Darley
Trusted by industry leaders
Let's Talk
Call us on one of the numbers below, we cover the whole of the UK, so call the nearest office.
“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”
Want to know what characteristics to look out for in a phishing e-mail? Our handy guide is here to help.
82% of data breaches involve a human element
What exactly is phishing? – An Introduction
For those of you who might be unclear about the definition, it is a form of fraud in which an attacker impersonates a reputable person or company, usually through a scam e-mail or another form of communication. This can be done in a variety of ways, some of which include distributing malicious links or gaining user credentials and account information – hence the name phishing. Phishing is popular with cyber criminals as it relies heavily on human error, something much easier to crack than computer code.
Fraudulent phishing emails are consistently the most common form of cybercrime, but despite the apparent growth in awareness about the method, people are still frequently falling victim. In fact, according to Verizon’s 2023 Data Breach Investigations Report, 82% of data breaches involve a human element… Unfortunately, these phishing attacks do not appear to be slowing down as cyber-criminals continue to take advantage of global events and prey on real-world concerns in order to cause a higher interaction and click-through rate.
In an attempt to raise further awareness about online threats such as phishing and to provide insight into what you and your employees should be looking out for, we thought we would take you through a real example of a phishing email received and spotted by one of our staff…
An example of a Phishing Email
This phishing email was a particularly good fake; however, there are still red flags that give away its lack of authenticity. Take a look at the fake email below, and we’ll explain why…
1) Be sure of the Sender
Always check the sender. This sender address does not appear to mimic a legitimate TV licensing email address. Always make sure you check the actual email address rather than just the sender name; an email from a public email system (such as an email domain like Gmail) is a red flag. – If the sender’s address is still unfamiliar to you, always take a few extra minutes to examine the content of the email.
2) False Scanning Claims
Do not be fooled by a ‘Protected’ or ‘Scanned for Malware’ message trying to lull you into a false sense of security… Is the web address correct?
3) Official Appearance
Similarly, do not be fooled by official-looking logos and images. Many cyber-criminals will use ‘scraped’ logos from a company in order to make their emails look legitimate.
4) Who is it addressed to?
Notice how this scam email is addressed to the ‘Customer’ rather than including any personal information or details. Likely because it is part of a generic email campaign sent to thousands of recipients… However, it is important to remember that using your name does not equal legitimacy – rather, it’s more likely to be part of a spear phishing campaign sent to targeted individuals.
5)Poor Spelling and Grammer
Poor spelling, grammatical errors and low-quality graphics are often a key giveaway that you have received a phishing email… This example is nearly flawless; however, in the larger bodies of text, you can spot unprofessional and informal use of language that would be unlikely to be included in an official email. With the advancements of AI, these mistakes will become harder to find and spot.
6) Strange Links
Finally, do not click on any of the links included in a suspicious email. Notice how this email is littered with links for you to click, such as ‘Sign in’, ‘Renew now’ and links to apparent social media pages? If clicked, these may take you to a criminal or malicious website… If you’re in doubt, you can hover your mouse over the hyperlink to see the full URL.
7) Extra Tip: Sense of Urgency
One area phishing scams often prey on is a person’s decreased judgment skills when under pressure. Phishing scammers will often add a time-sensitive element, such as urgently paying an invoice or only having days left to renew your TV license, as in the above example.
8) Extra Tip: Attachments
It’s always important to do all the phishing checks before you open an attachment. As well as attempting to gain your details, attachments often can carry malware, a type of cyber attack. Phishing scammers will often combine the above sense of urgency with an attachment to try and get you to click it without first thinking about its legitimacy.
Extra Tip 3: Sensitive Information
9) Extra Tip: Sensitive Information
Most companies won’t directly request sensitive information within an email, and will only raise important issues they may have with you. Details of requests for information, such as credit card details, phone numbers or two-factor verification text message codes, should be warning signs. Protect yourself from this by only contacting the company via known methods, such as their public email and phone numbers and verifying their request. Never reply, click links or call phone numbers within the email.
Key Takeaways
Cyber criminals only require one error from an employee for their operation to be successful… Therefore, it is integral to educate everyone in your organisation. Unfortunately, spam e-mail filters can never be guaranteed to be 100% effective, hence educating employees to understand and to recognise phishing campaigns is crucial.
Here at Stripe OLT, we additionally provide prevention through education. Our Cyber Security Education training days focus on specific areas of business risk and how to mitigate these appropriately. Our two types of training – Staff Cyber Awareness (SCA) and Executive Cyber Fundamentals (ECF) both include training on phishing campaigns, in order to provide your people with the information they need to become your business’s first line of cyber-defence. Get in touch to talk to one of our cyber security experts for more information on our tailored training days.
Remember, if you do receive an email that you are unsure about, you can always report it to the National Cyber Security Centre’s Suspicious Email Reporting Service by forwarding the email to report@phishing.gov.uk.
Stripe OLT has achieved the Microsoft Cloud Security Specialisation, proving our expertise in securing Azure and Microsoft cloud environments. Learn what this means for your business.
Stripe OLT is now part of the Microsoft FastTrack Program, giving SMEs direct access to expert-led cloud adoption, security, and digital transformation - at no extra cost. Find out how this accelerates your IT resilience?
Don’t let cyber criminals turn your holiday deals into a data breach. Check out our bite-sized security guide to keep your users, and your business, safe this shopping season.
Across the world, Windows computers have by effected the dreaded Blue Screen of Death (BSOD). This appears to have been caused by an outage of services provided by cyber security provider, CrowdStrike. The issue appears to have impacted a large number of organisations - from banks to airlines. Here are the current advisories.
Across the world, Windows computers have by effected the dreaded Blue Screen of Death (BSOD). This appears to have been caused by an outage of services provided by cyber security provider, CrowdStrike. The issue appears to have impacted a large number of organisations - from banks to airlines. Here are the current advisories.
We're thrilled to share the news: Stripe OLT has been recognised as one of the top 50 emerging stars at the prestigious Megabuyte100 Awards 2024. These awards stand out in the UK's tech landscape, offering an unbiased, expert analysis of companies' financial prowess via the Megabuyte Scorecard.
A big congratulations to our Microsoft 365 guru, Lewis Barry, who received MVP status for his incredible work within the Microsoft technology community.
Last week, the 2023 Scale-Up Awards took place at Novotel London West, concluding months of nominations and judging for this years’ most successful entrepreneurs and scale-up organisations. Naturally, we were extremely happy to be in attendance, but it turned out to be a very successful night...
As you may have seen in the press earlier this year, Stripe OLT recently achieved two crucial Microsoft certifications, in both Modern Work and Security. As such, we’re very proud to announce our cyber security team’s latest achievement - the Microsoft Security Threat Protection specialisation.
This website uses cookies. By using this site you agree to our use of cookies. We use cookies to enhance your experience. To understand the specific cookies we use and how we handle your data, see out Cookie Policy, Privacy Policy and Terms & Conditions. Manage your preferences at any time by clicking the 'View Preferences' button.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.