“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”

IT Operations Manager
Simon Darley
Trusted by industry leaders

Let's Talk

Call us on one of the numbers below, we cover the whole of the UK.

BriSTOL HQ & The South West

+44 (0) 117 974 5179

London & Surrounding Areas

+44 (0) 207 043 7044

Manchester & the North West

+44 (0) 161 399 1305

“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”

IT Operations Manager
Simon Darley
Trusted by industry leaders

Request a Call-back.

First we need a few details.

Contact Form Primary popup

Keep up to date with the experts

Get insights direct to your email inbox

NEWSLETTER - Exit Intent

Follow us on social

“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”

IT Operations Manager
Simon Darley
Trusted by industry leaders

Request a Call

First we need a few details.

Contact Form Primary popup

How to Spot a Phishing Email

In a nutshell:

Want to know what characteristics to look out for in a phishing e-mail? Our handy guide is here to help.

82% of data breaches involve a human element

What exactly is Phishing?

For those of you who might be unclear about the definition, it is the form of fraud in which an attacker impersonates a reputable person or company, usually through a scam e-mail or another form of communication. This can be done in a variety of ways, some of which include distributing malicious links or gaining user credentials and account information – hence the name phishing. Phishing is popular with cyber-criminals as it relies heavily on human error, something much easier to crack than computer code.

In an attempt to raise further awareness about phishing and to provide insight into what you and your employees should be looking out for, we thought we would take you through a real example of a phishing email received and spotted by one of our staff…

This phishing email was a particularly good fake, however there are still red flags that give away its lack of authenticity. Take a look at the email below, and we’ll explain why…

1) Always check the sender. This sender address does not appear to mimic a legitimate TV licensing email address. Always make sure you check the actual email address rather than just the sender name – if the sender address is still unfamiliar to you, always take a few extra minutes to examine the content of the email.

2) Do not be fooled by a ‘Protected’ or ‘Scanned for Malware’ message trying to lull you into a false sense of security… Is the web address correct?

3) Similarly, do not be fooled by official looking logo’s and images. Many cyber-criminals will use ‘scraped’ logos from a company in order to make their emails look legitimate.

4) Notice how this scam email is addressed to the ‘Customer’ rather than including any personal details? Likely because it is part of a generic email campaign sent to thousands of recipients… However, it is important to remember that using your name does not equal legitimacy – rather it’s more likely to be part of a spear phishing campaign sent to targeted individuals.

5) Spelling errors, poor grammar and low-quality graphics are often a key giveaway that you have received a phishing email… This example is nearly flawless, however in the larger bodies of text you can spot unprofessional and informal use of language that would be unlikely to be included in an official email.

6) Finally, do not click on any of the links included in a suspicious email. Notice how this email is littered with links for you to click such as ‘Sign in’, ‘Renew now’ and links to apparent social media pages? If clicked, these may take you to a criminal or malicious website… If you’re in doubt, you can hover your mouse over the hyperlink to see the full URL.


Key Takeaways

Our latest insights
  • AI Prompt Injection Attacks
    September 29, 2023
    Read full article
  • windows server 2012 end of life
    September 29, 2023
    Read full article
  • Microsoft Inspire
    September 29, 2023
    Read full article
  • September 29, 2023
    Read full article
  • September 29, 2023
    Read full article
  • Cloud migration
    September 29, 2023
    Read full article
  • cyber resilience
    July 20, 2023
    Read full article
  • MOVEit
    June 30, 2023
    Read full article
  • Disaster Recovery Plan
    July 20, 2023
    Read full article
  • ITIL Helpdesk
    June 30, 2023
    Read full article
  • June 30, 2023
    Read full article
  • digital UK security
    September 29, 2023
    Read full article