{"id":7988,"date":"2024-06-13T20:05:08","date_gmt":"2024-06-14T03:05:08","guid":{"rendered":"https:\/\/www.islandtechnologies.net\/blog\/?p=7988"},"modified":"2024-06-13T20:06:19","modified_gmt":"2024-06-14T03:06:19","slug":"how-to-spot-a-scam-email-phishing","status":"publish","type":"post","link":"https:\/\/www.islandtechnologies.net\/blog\/how-to-spot-a-scam-email-phishing\/","title":{"rendered":"How to spot a scam: Email Phishing"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Welcome to our new series!<\/h2>\n\n\n\n<p>Here at Island, we\u2019ve noticed an uptick in support calls related to internet scams. While the problem of cybercrime is complex, prevention can be fairly straightforward. Taking a few minutes to freshen up on what to look out for is a great way to protect your business. That\u2019s why we\u2019ve put together this short series of emails. Each one will give you a quick overview of what to watch out for. This week we\u2019ll look at Email Phishing scams.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><a href=\"https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image.png\"><img loading=\"lazy\" decoding=\"async\" width=\"457\" height=\"325\" src=\"https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image.png\" alt=\"\" class=\"wp-image-7989\" style=\"aspect-ratio:1.406153846153846;width:428px;height:auto\" srcset=\"https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image.png 457w, https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-300x213.png 300w\" sizes=\"auto, (max-width: 457px) 100vw, 457px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">How common are phishing emails?<\/h2>\n\n\n\n<p><em>&#8220;An estimated&nbsp;<strong>3.4 billion emails a day are sent by cyber criminals,<\/strong>&nbsp;designed to look like they come from trusted senders.&#8221; <\/em><\/p>\n\n\n\n<p class=\"has-text-align-right\"><em>\u2014 StationX 2024 Phishing Report<\/em><\/p>\n\n\n\n<p>Phishing emails are one of the most common ways to initiate a cyber attack. Not only that, but&nbsp;<a href=\"https:\/\/islandtechnologies.createsend1.com\/t\/y-i-xuipn-l-y\/\" target=\"_blank\" rel=\"noreferrer noopener\">a 2023 report<\/a>&nbsp;from Comcast found that as many as&nbsp;<strong>2-in-3 malware attacks start with a phishing attempt.<\/strong>&nbsp;While a lot of these get captured by our spam filters, many don&#8217;t. We need to stay on alert as it often only takes one wrong click to download dangerous malware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What to look out for?<\/h2>\n\n\n\n<p>Most of us have been warned not to respond to any \u201cforeign prince\u201d promising us his inheritance over email. Many other common scams are just as clich\u00e9 and easy to spot. Yet, like we said in the beginning, we\u2019ve been seeing an increase in successful phishing attempts. We believe this is due to advances in spammers\u2019 ability to put together more believable scams.<\/p>\n\n\n\n<p>Taken from the&nbsp;<a href=\"https:\/\/islandtechnologies.createsend1.com\/t\/y-i-xuipn-l-j\/\" target=\"_blank\" rel=\"noreferrer noopener\">Federal Trade Commission&#8217;s research on phishing scams,<\/a>&nbsp;here are the most common scenarios posed by scammers:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>They\u2019ve noticed some suspicious activity or log-in attempts<\/li>\n\n\n\n<li>They say there\u2019s a problem with your account or your payment information<\/li>\n\n\n\n<li>They need to confirm some personal or financial information<\/li>\n\n\n\n<li>The email includes an invoice you don\u2019t recognize<\/li>\n\n\n\n<li>The email directs you to click on a link to make a payment<\/li>\n\n\n\n<li>They say you\u2019re eligible to register for a government refund<\/li>\n\n\n\n<li>The email contains an offer or&nbsp;coupon for free stuff&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Of course, in the case of a scam, none of these scenarios are true, but many of these could seem legitimate at first glance.&nbsp;In order to determine if the email is legitimate or not, here are some examples to keep in mind:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"866\" height=\"433\" src=\"https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-1.png\" alt=\"\" class=\"wp-image-7990\" srcset=\"https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-1.png 866w, https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-1-300x150.png 300w, https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-1-768x384.png 768w\" sizes=\"auto, (max-width: 866px) 100vw, 866px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-text-align-right\"><em>Tip:&nbsp;Before you click a link, hover your cursor over it. Doing that will reveal the destination URL, as you see in the picture. If the destination seems strange or inappropriate, don\u2019t click it.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"863\" height=\"372\" src=\"https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-2.png\" alt=\"\" class=\"wp-image-7991\" srcset=\"https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-2.png 863w, https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-2-300x129.png 300w, https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-2-768x331.png 768w\" sizes=\"auto, (max-width: 863px) 100vw, 863px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-text-align-right\"><em>Tip: pay attention to the sender&#8217;s email. Check for spelling errors and swapped letters, and if the email is from the correct domain (e.g., Amazon would not send an email from an @gmail.com account, etc).<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-3.png\"><img loading=\"lazy\" decoding=\"async\" width=\"867\" height=\"557\" src=\"https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-3.png\" alt=\"\" class=\"wp-image-7992\" srcset=\"https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-3.png 867w, https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-3-300x193.png 300w, https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-3-768x493.png 768w\" sizes=\"auto, (max-width: 867px) 100vw, 867px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-text-align-right\"><em>Tip: Watch out for phony attachments like the one pictured above. Disguised as an invoice, the file likely contains malware.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-right has-small-font-size\"><em>Photos courtesy of&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/islandtechnologies.createsend1.com\/t\/y-i-xuipn-l-t\/\" target=\"_blank\">The University of Memphis<\/a><\/em><\/p>\n\n\n\n<p>Ultimately, listen to your intuition. If something feels off, investigate further before clicking any links or calling any numbers in the email.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to keep your business safe:<\/h2>\n\n\n\n<p>Here are the steps we suggest you take to protect your business from scammers<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Do not click any links or call any numbers provided in the email.<\/strong>&nbsp;If you are unsure about the legitimacy of the email, go to the official website of whatever institution and call\/email them directly.<\/li>\n\n\n\n<li><strong>Forward any suspicious email to&nbsp;<a href=\"mailto:support@islandtechnologies.net\" target=\"_blank\" rel=\"noreferrer noopener\">support@islandtechnologies.net<\/a>&nbsp;and we will assess the legitimacy of the email and suggest next steps.<\/strong>&nbsp;This is a complementary service we offer to all of our clients.&nbsp;<\/li>\n\n\n\n<li><strong>Schedule regular backups for all of your data.<\/strong>&nbsp;Scammers cannot ransom&nbsp;your data if you have it all safely backed up.<\/li>\n\n\n\n<li><strong>Use a reliable Email Service Provider with robust Spam Filtering software.<\/strong>&nbsp;If you&#8217;d like recommendations on which services to use for your business, you may reach out to us at contactus@islandtechnologies.net.<\/li>\n<\/ol>\n\n\n\n<p>We hope this has been a helpful article for you, and we encourage you to share it with your team as a quick refresher. Next week we will be talking about a more personalized and harder to spot type of internet scam called \u201cSpear Phishing\u201d.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to our new series! Here at Island, we\u2019ve noticed an uptick in support calls related to internet scams. While the problem of cybercrime is complex, prevention can be fairly straightforward. Taking a few minutes to freshen up on what to look out for is a great way to protect your business. That\u2019s why we\u2019ve &hellip; <a href=\"https:\/\/www.islandtechnologies.net\/blog\/how-to-spot-a-scam-email-phishing\/\">Continued<\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-7988","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/posts\/7988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/comments?post=7988"}],"version-history":[{"count":4,"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/posts\/7988\/revisions"}],"predecessor-version":[{"id":7996,"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/posts\/7988\/revisions\/7996"}],"wp:attachment":[{"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/media?parent=7988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/categories?post=7988"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/tags?post=7988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}