Types of Phishing: Tips to Prevent, Spot, Report Scam Emails
October is National Cybersecurity Awareness Month, reminding us that it's important to protect our personal information online. One way to do that is to recognize and avoid falling victim to phishing scams.
What is Phishing and How Does It Work?
Phishing is a tactic scammers use to impersonate legitimate companies and attempt to grab your sensitive information such as passwords, credit card details, other banking and payment information, usernames, money, and more. Think of how fishermen use bait to catch fish — your personal information is the fish in this scenario, the scammer is the fisherman, and the bait is the fraudulent email they send you. The email might ask you to click on a link and update your information, for example.
Types of Phishing
There are different types of phishing emails to be on the lookout for. However, according to Josh Gomez, information security analyst at Southern New Hampshire University’s (SNHU) Information Security Management Office, the three main categories of phishing that are known in the industry include:
- Clone Phishing – Replica emails of legitimate messages to trick its target into sharing personal information
- Business Email Compromise (BEC) – Targeted to specific employees in finance or accounts payable departments who are authorized to initiate money transfers
- Whaling – Phishing that targets an organization’s C-suite executives
How to Spot A Phishing Email
At first glance, it can be easy to miss a phishing attempt. Before responding to an email or clicking any of its links, be aware of these red flags provided by Robin Sullivan, program manager at SNHU's Information Security Management Office:
- You’re asked to confirm personal information
- The web and email address don’t look genuine
- The email is poorly written
- There are misspellings, spoof display names
- Tries to instill a sense of urgency
How to Prevent Phishing
Phishing scams can be costly to businesses and individuals. “Compromised information as a result of phishing can cause significant damage to a person or an organization. It can lead to identity theft, financial loss, loss of access to email, and loss of personal identifiable information,” Sullivan said. So, it’s important to know how to prevent falling prey to a phishing attempt. Sullivan offers these tips:
- Use strong, unique passwords for each of your online identities. Never re-use the same password for multiple online identities. Choose different letters, numbers, and symbols, and don't use anything common that can be researched publicly about you.
- Never click links in an email. If you receive a notification, for example, from your bank, log in directly to the bank’s website instead of using the link in your email.
- Never share personal or financial information in an email.
- Always be suspicious of unsolicited emails and phone calls.
- If it sounds “too good to be true,” it probably is.
- Use anti-virus, email filtering and firewalls to reduce phishing traffic.
“But no matter how many controls are put in place to protect our environment, the best defense will continue to be user awareness and vigilance,” Sullivan said. “As technology changes, scams become more sophisticated and complex, and we will always have these threats to some degree.”
How To Report Scam Emails
If you feel you’ve received a phishing attempt, be sure to report the scam to help prevent it from happening to others. Gomez suggests these resources:
- Report email as phishing or SPAM – Many email providers have buttons within their platforms to report the individual email as phishing or spam. Be sure to check yours.
- Report suspicious websites to Google Safe Browsing or security solution software firm ESET.
- Report scams and fraud to the Federal Trade Commission (FTC) Online Complaint Assistant and the Internet Crime Complaint Center (IC3).
SPAM vs. Phishing
SPAM is when someone sends an email to several users at once or is trying to sell something by pushing their product on users as a usually unsuccessful attempt at marketing. Think of it as annoying junk mail, where the sender isn’t purposely trying to steal your information as compared to phishing.
See how savvy you are by taking Google’s Phishing Quiz to learn how you can better identify phishing emails and protect yourself from potential cyber threats.
Michelle Shreeve ’15, ’16 is a freelance writer and the author of “Parental Death: The Ultimate Teen Guide.” Connect with her on LinkedIn.
Explore more content like this article
Engineering Professor Dr. Anat Eshed: A Faculty Q&A
After basing her career on physics and materials science, Dr. Anat Eshed shifted her focus to cognition and learning. She teaches at SNHU's College of Engineering, Technology, and Aeronautics. She shared her views on teaching and the importance of education as part of our Faculty Spotlight series.
What is a Drone and Do you Need a License to Fly One?
Drones can be flown for commercial, public safety or recreational reasons. To become a drone pilot, you must fully understand FAA regulations, operating requirements and procedures for safely flying them. Just as you would need a license to drive a car, you also need a license to fly a drone.
Construction Management Professor Nathaniel St. Jean: A Faculty Q&A
Architect and designer Nathaniel St. Jean is among the first professors in SNHU's construction management program, helping to educate a new generation of construction professionals. He shared his thoughts on teaching, the importance of education and more as part of our Faculty Spotlight series.