How to Spot a Phishing Email

Posted on by Net Primates

About this video

Phishing emails are one of the most dangerous threats facing companies on a daily basis, and we explain what they are, and how to go about spotting them.

In the video we cover:

  • The 3 Types of Phishing Email you’re likely to see
  • Examples of each type of Phishing Email and their intended result
  • Why online file sharing services can increase the likelihood of something being clicked on or downloaded
  • How to spot suspicious emails that appear to be from within your own company
  • Things threat actors do to convince you to take action

 

Take away actions on this topic are

  1. Implement & pay attention to Security Warnings
  2. Discuss Phishing during your regular Security Awareness Training
  3. Consider implementing routine phishing testing / training for your team
  4. Implement procurement processes and stick to them!

For more videos in this series, please subscribe to our youtube channel linked below, or visit https://www.netprimates.com/tips

Contact Us if you have any questions on this topic, feedback on how we can improve these videos, or suggestions for future topics you’d like us to cover!

Resources related to this video

Net Primates Videos

Return to our IT & Cyber Security Tips page at https://www.netprimates.com/tips

Recent Tips

Cyber Security 101 - Passwords

About this video Exploring the MASSIVE impact that Passwords have on Cyber Security, why theyR...

What to do if your password is hacked or stolen

Summary of the steps outlined in Video Change your password immediately – even if you̵...

Don't reuse passwords! Here is why ...

About this video This video explains problems with reusing passwords across multiple sites / serv...

How to create strong passwords you can actually remember!

About this video A quick & easy to learn, process to generate AND REMEMBER secure passwords f...

What is Multi Factor Authentication (MFA) and why you should use it

About this video This video introduces the recent evolution of Computer Authentication, from basi...