X

Types of Phishing: Tips to Prevent, Spot, Report Scam Emails

Two white envelope email icons caught on a yellow fish hooks and the text What is phishing.

October is National Cybersecurity Awareness Month, reminding us that it's important to protect our personal information online. One way to do that is to recognize and avoid falling victim to phishing scams.

What is Phishing and How Does It Work?

Josh Gomez and the text Josh GomezPhishing is a tactic scammers use to impersonate legitimate companies and attempt to grab your sensitive information such as passwords, credit card details, other banking and payment information, usernames, money, and more. Think of how fishermen use bait to catch fish — your personal information is the fish in this scenario, the scammer is the fisherman, and the bait is the fraudulent email they send you. The email might ask you to click on a link and update your information, for example.

Types of Phishing

There are different types of phishing emails to be on the lookout for. However, according to Josh Gomez, information security analyst at Southern New Hampshire University’s (SNHU) Information Security Management Office, the three main categories of phishing that are known in the industry include:

  1. Clone Phishing – Replica emails of legitimate messages to trick its target into sharing personal information
  2. Business Email Compromise (BEC) – Targeted to specific employees in finance or accounts payable departments who are authorized to initiate money transfers
  3. Whaling – Phishing that targets an organization’s C-suite executives

How to Spot A Phishing Email

Robin Sullivan and the text Robin SullivanAt first glance, it can be easy to miss a phishing attempt. Before responding to an email or clicking any of its links, be aware of these red flags provided by Robin Sullivan, program manager at SNHU's Information Security Management Office:

  • You’re asked to confirm personal information
  • The web and email address don’t look genuine
  • The email is poorly written
  • There are misspellings, spoof display names
  • Tries to instill a sense of urgency

How to Prevent Phishing

Phishing scams can be costly to businesses and individuals. “Compromised information as a result of phishing can cause significant damage to a person or an organization. It can lead to identity theft, financial loss, loss of access to email, and loss of personal identifiable information,” Sullivan said. So, it’s important to know how to prevent falling prey to a phishing attempt. Sullivan offers these tips:

  • Use strong, unique passwords for each of your online identities. Never re-use the same password for multiple online identities. Choose different letters, numbers, and symbols, and don't use anything common that can be researched publicly about you.
  • Never click links in an email. If you receive a notification, for example, from your bank, log in directly to the bank’s website instead of using the link in your email.
  • Never share personal or financial information in an email.
  • Always be suspicious of unsolicited emails and phone calls.
  • If it sounds “too good to be true,” it probably is.
  • Use anti-virus, email filtering and firewalls to reduce phishing traffic.

“But no matter how many controls are put in place to protect our environment, the best defense will continue to be user awareness and vigilance,” Sullivan said. “As technology changes, scams become more sophisticated and complex, and we will always have these threats to some degree.”

How To Report Scam Emails

If you feel you’ve received a phishing attempt, be sure to report the scam to help prevent it from happening to others. Gomez suggests these resources:

SPAM vs. Phishing

SPAM is when someone sends an email to several users at once or is trying to sell something by pushing their product on users as a usually unsuccessful attempt at marketing. Think of it as annoying junk mail, where the sender isn’t purposely trying to steal your information as compared to phishing.

See how savvy you are by taking Google’s Phishing Quiz to learn how you can better identify phishing emails and protect yourself from potential cyber threats.

Michelle Shreeve ’15, ’16 is a freelance writer and the author of “Parental Death: The Ultimate Teen Guide.” Connect with her on LinkedIn.

STEM

Explore more content like this article

Man working as IT manager standing in a server room working on a laptop.

What is Information Technology (IT)?

October 29, 2019

Information technology (IT) is a broad professional category covering functions including building communications networks, safeguarding data and information, and troubleshooting computer problems.

The women from SNHU who attended the 2019 Grace Hopper Celebration lined up on a staircase.

29 SNHU Students Attend GHC, World's Largest Women in Tech Conference

October 16, 2019

Lines snaked through the Orange County Convention Center in Orlando, Florida, as more than 26,000 people from 90 countries came together for the annual Grace Hopper Celebration. Twenty-nine of these attendees hailed from Southern New Hampshire University.

A series of digital ones and zeros in various shades of purple, pink and blue.

Tapia Conference Opportunity for Students to Learn, Grow, Network

October 04, 2019

Six Southern New Hampshire University (SNHU) students were after knowledge, internships and jobs when they recently attended the ACM Richard Tapia Celebration of Diversity in Computing.

Explore Programs