X

Types of Phishing: Tips to Prevent, Spot, Report Scam Emails

Two white envelope email icons caught on a yellow fish hooks and the text What is phishing.

October is National Cybersecurity Awareness Month, reminding us that it's important to protect our personal information online. One way to do that is to recognize and avoid falling victim to phishing scams.

What is Phishing and How Does It Work?

Josh Gomez and the text Josh GomezPhishing is a tactic scammers use to impersonate legitimate companies and attempt to grab your sensitive information such as passwords, credit card details, other banking and payment information, usernames, money, and more. Think of how fishermen use bait to catch fish — your personal information is the fish in this scenario, the scammer is the fisherman, and the bait is the fraudulent email they send you. The email might ask you to click on a link and update your information, for example.

Types of Phishing

There are different types of phishing emails to be on the lookout for. However, according to Josh Gomez, information security analyst at Southern New Hampshire University’s (SNHU) Information Security Management Office, the three main categories of phishing that are known in the industry include:

  1. Clone Phishing – Replica emails of legitimate messages to trick its target into sharing personal information
  2. Business Email Compromise (BEC) – Targeted to specific employees in finance or accounts payable departments who are authorized to initiate money transfers
  3. Whaling – Phishing that targets an organization’s C-suite executives

How to Spot A Phishing Email

Robin Sullivan and the text Robin SullivanAt first glance, it can be easy to miss a phishing attempt. Before responding to an email or clicking any of its links, be aware of these red flags provided by Robin Sullivan, program manager at SNHU's Information Security Management Office:

  • You’re asked to confirm personal information
  • The web and email address don’t look genuine
  • The email is poorly written
  • There are misspellings, spoof display names
  • Tries to instill a sense of urgency

How to Prevent Phishing

Phishing scams can be costly to businesses and individuals. “Compromised information as a result of phishing can cause significant damage to a person or an organization. It can lead to identity theft, financial loss, loss of access to email, and loss of personal identifiable information,” Sullivan said. So, it’s important to know how to prevent falling prey to a phishing attempt. Sullivan offers these tips:

  • Use strong, unique passwords for each of your online identities. Never re-use the same password for multiple online identities. Choose different letters, numbers, and symbols, and don't use anything common that can be researched publicly about you.
  • Never click links in an email. If you receive a notification, for example, from your bank, log in directly to the bank’s website instead of using the link in your email.
  • Never share personal or financial information in an email.
  • Always be suspicious of unsolicited emails and phone calls.
  • If it sounds “too good to be true,” it probably is.
  • Use anti-virus, email filtering and firewalls to reduce phishing traffic.

“But no matter how many controls are put in place to protect our environment, the best defense will continue to be user awareness and vigilance,” Sullivan said. “As technology changes, scams become more sophisticated and complex, and we will always have these threats to some degree.”

How To Report Scam Emails

If you feel you’ve received a phishing attempt, be sure to report the scam to help prevent it from happening to others. Gomez suggests these resources:

SPAM vs. Phishing

SPAM is when someone sends an email to several users at once or is trying to sell something by pushing their product on users as a usually unsuccessful attempt at marketing. Think of it as annoying junk mail, where the sender isn’t purposely trying to steal your information as compared to phishing.

See how savvy you are by taking Google’s Phishing Quiz to learn how you can better identify phishing emails and protect yourself from potential cyber threats.

Michelle Shreeve ’15, ’16 is a freelance writer and the author of “Parental Death: The Ultimate Teen Guide.” Connect with her on LinkedIn.

STEM

Explore more content like this article

A woman wearing glasses and a white jacket working with an employee in her role as an IT manager.

How to Become an IT Manager

January 22, 2020

Curious about how to become an IT manager? The first step: Assess where you are on your career path, then get the education and experience you need to move forward.

Jim Naro

MBA Alumnus Helped in Deployment of the Internet, Now Teaches Sales

January 09, 2020

Though Jim Naro '85MBA knew there was something special happening in technology, he had no idea his MBA would lead him to a team that would be instrumental in the deployment of the internet.

A series of ones and zeroes forming an undulating wave.

SNHU Team Reaches Finals of Teradata Analytics Competition

December 05, 2019

A group of three Southern New Hampshire University students made the finals of a global data analytics challenge this fall, beating out dozens of teams from around the world.

Explore Programs