By now, most people are aware of phishing scams and how to recognize suspicious emails from unknown senders or emails that contain strange hyperlinks. But what happens when the email appears to be from a trusted contact with, what could be, a valid reason? Here’s an example of a real-world phishing scam, targeting customers like you from an imposter posing as me, Walter Goodfield!
The email below is real. It was forwarded to me by a customer of ours who suspected the email was a scam. Upon a closer look, there are seven items in this email that individually, are suspicious, but collectively are impossible to ignore as a scam. Let’s examine the evidence one-by-one.
If you’ve been a victim of this phishing scam or suspect that others in your organization have been, please follow these simple instructions.
The seven tips above were documented to help you identify the bogus data along with inconsistencies and to avoid falling victim to malicious attempts to access your information.
What: In this webinar, we will outline a few of the major areas that your business should consider in a risk assessment. including how to manage risk, mitigate risk, and how to use your IT back and recovery plan to a competitive advantage.
When: Wednesday, Jan 24th | 2pm est, 11am pst
For More Cyber Security Blogs
Cybercrime Prevention Strategies
Cybercrime Prevention in Social Networking Websites
Cybersecurity Things You Should Know
Cybersecurity Assessment
RKL eSolutions IT Services team has several cybersecurity experts on staff should you have any further questions on how you can protect yourself.