โ€œWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ€

IT Operations Manager
Simon Darley
Trusted by industry leaders

Let's Talk

Call us on one of the numbers below, we cover the whole of the UK, so call the nearest office.

BriSTOL HQ & The South West

London & Surrounding Areas

Manchester & the North

โ€œWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ€

IT Operations Manager
Simon Darley
Trusted by industry leaders

Request a Call-back.

First we need a few details.

ENQUIRY - Contact Popup DEPRECIATED (#3)

Keep up to date with the experts

Get insights directly to your email inbox

MAIL LIST - Newsletter, Exit Intent Popup (#13)

Follow us on social

โ€œWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ€

IT Operations Manager
Simon Darley
Trusted by industry leaders

Request a Call

First we need a few details.

ENQUIRY - Popup w/ Captcha for light backgrounds (#21)

How to Spot a Phishing Email - with Example

Published: December 1, 2020
Updated: May 29, 2024
In a nutshell:

Want to know what characteristics to look out for in a phishing e-mail? Our handy guide is here to help.

82% of data breaches involve a human element

What exactly is Phishing? – An Introduction

For those of you who might be unclear about the definition, it is a form of fraud in which an attacker impersonates a reputable person or company, usually through a scam e-mail or another form of communication. This can be done in a variety of ways, some of which include distributing malicious links or gaining user credentials and account information โ€“ hence the name phishing. Phishing is popular with cyber-criminals as it relies heavily on human error, something much easier to crack than computer code.

In an attempt to raise further awareness about online threats such as phishing and to provide insight into what you and your employees should be looking out for, we thought we would take you through a real example of a phishing email received and spotted by one of our staffโ€ฆ

This phishing email was a particularly good fake, however, there are still red flags that give away its lack of authenticity. Take a look at the fake email below, and weโ€™ll explain whyโ€ฆ

1) Be sure of the Sender

Always check the sender. This sender address does not appear to mimic a legitimate TV licensing email address. Always make sure you check the actual email address rather than just the sender name, an email from a public email system (such as an email domain like Gmail) is a red flag. โ€“ if the sender’s address is still unfamiliar to you, always take a few extra minutes to examine the content of the email.

2) False Scanning Claims

Do not be fooled by a โ€˜Protectedโ€™ or โ€˜Scanned for Malwareโ€™ message trying to lull you into a false sense of securityโ€ฆ Is the web address correct?

3) Official Appearance

Similarly, do not be fooled by official-looking logos and images. Many cyber-criminals will use โ€˜scrapedโ€™ logos from a company in order to make their emails look legitimate.

4) Who is it Addressed to?

Notice how this scam email is addressed to the โ€˜Customerโ€™ rather than including any personal information and details. Likely because it is part of a generic email campaign sent to thousands of recipientsโ€ฆ However, it is important to remember that using your name does not equal legitimacy โ€“ rather itโ€™s more likely to be part of a spear phishing campaign sent to targeted individuals.

5)Poor Spelling and Grammer

Poor spelling, grammatical errors and low-quality graphics are often a key giveaway that you have received a phishing emailโ€ฆ This example is nearly flawless, however in the larger bodies of text you can spot unprofessional and informal use of language that would be unlikely to be included in an official email. With the advancements of AI, these mistakes will become harder to find and spot.

Finally, do not click on any of the links included in a suspicious email. Notice how this email is littered with links for you to click such as โ€˜Sign inโ€™, โ€˜Renew nowโ€™ and links to apparent social media pages? If clicked, these may take you to a criminal or malicious websiteโ€ฆ If youโ€™re in doubt, you can hover your mouse over the hyperlink to see the full URL.

Extra Tip 3: Sensitive Information


Key Takeaways