Archives - Phishing


Keep an eye on subject lines in suspicious emails

Phishing emails are usually carefully crafted to look like authentic communications. They still give themselves away in subtle ways, though. For example, look at the subject line closely: If it includes your email address or an all-caps call to action, don’t engage.

Unsubscribe from irrelevant email newsletters

Some email newsletters can be useful if they’re relevant to your interests, as they provide regular updates. But many of them just can eat up a lot of space in your inbox and put you at unnecessary risk, by raising the possibility you’ll click through to a page that’s trying to capture information about you. […]

Shop online by navigating to websites through your browser

If you get an email with a link to a store, don’t click on the link to do your shopping. Open up a new tab and find the online store through your browser. This could protect you against phishing scams, which are attempts to gain personal information like your credit card number through reputable-sounding email […]

Share access to Google Docs instead of sending attachments or links

To ensure that you’re able to preserve access and editing permissions on Google Docs, share files with your collaborators directly. This is also a preferable option over emailing attachments, which is a technique that is commonly exploited by phishers. From an open Doc, click the Share button in the top right corner. Add email addresses, […]

How to spot business email compromise and avoid the threat while working from home

In August 2020, the United States Department of Justice announced that a citizen from Ghana had been extradited to the U.S. in connection with a coordinated fraud scheme responsible for hundreds of thousands of dollars in losses. At the center of the allegations was a business email compromise (BEC) attack targeting a Memphis real estate […]

Fast-track security reports

If you’re working from home but still need to troubleshoot with an employer IT administrator, don’t jumble help-desk requests in a single feed. Use a VIP channel for IT issues or security concerns so that they are directed straight to an IT professional who can address them. A phishing scam is a good example of […]