How to tell scam email from genuine

How to tell scam email from genuine

We all receive a lot of junk over the internet these days. In this article, we’ll list some good common sense tips as well as cover some common scam tactics to watch out for.

We all receive a lot of junk over the internet these days.

In fact, statistics from our own Anti-Spam service has found that as much as 60% of some of our customer’s emails are junk!

How to tell scam email from genuine 1

Even with sophisticated mail filtering and Anti-Malware in place however, it may only take 1 person in your business clicking the wrong link or opening the wrong file in a scam email to let a scammer into your system.

In this article, we’ll list some good common sense tips as well as cover some common scam tactics to watch out for.

Would the real Les Chilton please stand up?

One of the easiest ways to fool people into going along with a scam is to pretend to be someone they know.

Here’s an email I sent to our support mailbox.

How to tell scam email from genuine 2

Looks a bit sketchy doesn’t it. And not just because I’m the sender! I’m sure it won’t surprise anyone to learn that this email wasn’t actually sent by me.

Firstly, the email uses a generic subject that could apply to any conversation, it doesn’t name the recipient, and it’s not written in the usual style I’d use in my emails.

It’s really easy to set up a new email address and set your name as anything you wish. Some smart scammers will even use this to set their name as full email addresses, so it might list the recipient as my email address even the sender has no access to AlphaFirst’s email system.

So how can you tell?

If you double click the profile icon next to their recipient name in your email, it’ll open their contact card.

How to tell scam email from genuine 3

This will quickly let you see the real address of the sender.

If in doubt, it’s always worth checking

Don’t assume an out of context email is from who it says it’s from.

Equally, don’t assume the sender has been hacked (Though definitely let them and / or your technical team know they might have been).

Just like senders addresses, links are very easy to make misleading.

Scammers will likely post a link that seems to be pointing to a familiar or reputable resource.

My favourite of these scams will start with a fake invoice for something I haven’t bought with a link to Click Here to log into your account and check / cancel your order

Most scammers will then take it a stage further, creating an exact replica of the page you’re expecting (Like the Amazon or Paypal login page for example).

They’re trying to get you to click login, and then enter your username and password as you would on the real site, only when you do so on their fake page, it’ll save a copy of your details for the scammer.

It’s very easy to change the title of a hyperlink so that it displays one thing, and points to another.

How to tell scam email from genuine 4

Thankfully it’s very easy to spot a fake. Simply hover your cursor over a link and it’ll display where it’s really pointing.

What about this file you sent me?

This will be a short section… Just don’t open it.

People used to send executable files or viruses hidden in .zip folders to targets, but these days most mail clients block sending these file types automatically.

That said, it’s still possible to embed viruses into every day file formats, so you can never be sure.

The simple answer for this one is just not to open it if you’re not sure.

Speak to the sender, ask them what it is and why you were sent it.

If you can’t guarantee its safety, delete it and report it to your technical team.

Don’t send the file on to anyone (even the technical team unless they ask you to), as it’ll only take one person to open the document without reading your message to potentially let something nasty loose in their system.

What Else Can You Do To Protect Your Business?

Email scams are an arms race of schemes and solutions.

As such, no tips, tricks, tools or safeguards will ever be 100% effective at stopping fraudulent email and malicious content.

That said, in addition to essential industry standard Antivirus, Anti-Malware, and Firewall solutions, a mail filtering system can greatly reduce the amount of illegitimate email you receive.

These systems quickly identify email addresses that are behaving strangely (Sending large amounts of mail, sending unsolicited marketing materials or low quality mail) and stop them from being delivered in the first place.

If you’d like our recommendations on any of these solutions, we’d be happy to discuss the best option for your business with you, get in touch!.

Did you like this article?

Please help to share it on social media

LinkedIn
Facebook
Twitter
Email
WhatsApp

Leave a Reply

Your email address will not be published. Required fields are marked *

Looking for further information?

Here’s some related content from our knowledge hub that you may find useful

What is cloud technology?

What is Cloud Technology?

If you’ve ever wondered, “What is cloud technology?” you’re not alone. It’s a term that gets used a lot in business and everyday life, but it can feel like one of those techy concepts that’s hard to pin down.

Don’t worry – we’re here to break it down into plain English and show you how cloud technology can make life easier for your business.

Read More
Boost Your Content Creation Using AI Copywriting Tools

Boost Your Content Creation Using AI Copywriting Tools

Creating engaging and high-quality content consistently can be a challenge for many businesses and individuals. Fortunately, generative AI tools such as ChatGPT, Google Gemini and Microsoft Copilot have emerged as powerful solutions to streamline the content creation process.

Read More
Best practices for Outlook mailbox size

Best practices for Outlook mailbox size

Efficient email management is crucial for maintaining productivity. A large, unorganised Outlook mailbox can significantly hinder workflow and potentially lead to data loss. To ensure optimal performance and avoid these issues, it is essential to implement effective strategies for managing mailbox size.

Read More
Steps after a data breach

Steps after a data breach

A data breach can feel like a devastating blow. It’s a breach of trust, a loss of control, and a potential Pandora’s Box of problems. But knowledge is power. Understanding what a data breach is, and more importantly, knowing the crucial steps to take in its aftermath, can equip you to navigate this turbulent situation and emerge stronger on the other side.

Read More