Types of Phishing: Tips to Prevent, Spot, Report Scam Emails

Two white envelope email icons caught on a yellow fish hooks and the text What is phishing.

October is National Cybersecurity Awareness Month, reminding us that it's important to protect our personal information online. One way to do that is to recognize and avoid falling victim to phishing scams.

What is Phishing and How Does It Work?

Josh Gomez and the text Josh GomezPhishing is a tactic scammers use to impersonate legitimate companies and attempt to grab your sensitive information such as passwords, credit card details, other banking and payment information, usernames, money, and more. Think of how fishermen use bait to catch fish — your personal information is the fish in this scenario, the scammer is the fisherman, and the bait is the fraudulent email they send you. The email might ask you to click on a link and update your information, for example.

Types of Phishing

There are different types of phishing emails to be on the lookout for. However, according to Josh Gomez, information security analyst at Southern New Hampshire University’s (SNHU) Information Security Management Office, the three main categories of phishing that are known in the industry include:

  1. Clone Phishing – Replica emails of legitimate messages to trick its target into sharing personal information
  2. Business Email Compromise (BEC) – Targeted to specific employees in finance or accounts payable departments who are authorized to initiate money transfers
  3. Whaling – Phishing that targets an organization’s C-suite executives

How to Spot A Phishing Email

Robin Sullivan and the text Robin SullivanAt first glance, it can be easy to miss a phishing attempt. Before responding to an email or clicking any of its links, be aware of these red flags provided by Robin Sullivan, program manager at SNHU's Information Security Management Office:

  • You’re asked to confirm personal information
  • The web and email address don’t look genuine
  • The email is poorly written
  • There are misspellings, spoof display names
  • Tries to instill a sense of urgency

How to Prevent Phishing

Phishing scams can be costly to businesses and individuals. “Compromised information as a result of phishing can cause significant damage to a person or an organization. It can lead to identity theft, financial loss, loss of access to email, and loss of personal identifiable information,” Sullivan said. So, it’s important to know how to prevent falling prey to a phishing attempt. Sullivan offers these tips:

  • Use strong, unique passwords for each of your online identities. Never re-use the same password for multiple online identities. Choose different letters, numbers, and symbols, and don't use anything common that can be researched publicly about you.
  • Never click links in an email. If you receive a notification, for example, from your bank, log in directly to the bank’s website instead of using the link in your email.
  • Never share personal or financial information in an email.
  • Always be suspicious of unsolicited emails and phone calls.
  • If it sounds “too good to be true,” it probably is.
  • Use anti-virus, email filtering and firewalls to reduce phishing traffic.

“But no matter how many controls are put in place to protect our environment, the best defense will continue to be user awareness and vigilance,” Sullivan said. “As technology changes, scams become more sophisticated and complex, and we will always have these threats to some degree.”

How To Report Scam Emails

If you feel you’ve received a phishing attempt, be sure to report the scam to help prevent it from happening to others. Gomez suggests these resources:

SPAM vs. Phishing

SPAM is when someone sends an email to several users at once or is trying to sell something by pushing their product on users as a usually unsuccessful attempt at marketing. Think of it as annoying junk mail, where the sender isn’t purposely trying to steal your information as compared to phishing.

See how savvy you are by taking Google’s Phishing Quiz to learn how you can better identify phishing emails and protect yourself from potential cyber threats.

Michelle Shreeve ’15, ’16 is a freelance writer and the author of “Parental Death: The Ultimate Teen Guide.” Connect with her on LinkedIn.

STEM

Explore more content like this article

A woman points at a computer screen and gives advice on how to become a web developer

How to Become a Web Developer

February 15, 2021

As technology continues to become a growing part of our daily and professional lives, a career in web development can help you find work in virtually any field. But before you learn web design and start an exciting career in development, it's important to understand how to become a web developer.

A student exploring what cyber security is, holding a tablet and standing in front of large machines at his internship.

What is Cyber Security and Why is it Important?

February 10, 2021

In recent years, headlines about cyber security have become increasingly commonplace. For companies of all sizes, keeping information safe is a growing concern.

A woman looks at a computer screen studying how to become a software engineer

How to Become a Software Engineer

February 08, 2021

Software engineering is a particularly versatile and rewarding tech-focused career. This is a growing and vibrant career path for anyone who likes solving problems, thinking creatively and using technology to create new business solutions.