top of page

Fraudulent emails – Identify and discard


Identify and discard


Based on Hong J.  (Hong, 2012) Phishing emails are a type of targeted email attack where social engineers lure the recipient into performing specific actions such as clicking on a malicious link, opening a malicious attachment, or visiting a web page and entering their personal information.


Furthermore, Singer PW and Friedman  A  (Singer & Friedman, 2014) mentions that Phishing attacks seek to trick recipients into believing that an email is legitimate, in order to solicit sensitive information (e.g., usernames, passwords, and credit card numbers) or install malware. As a result, phishing is a fundamental component of many cyber-attacks and is often used as a first step in advanced persistent threats.

 

Below you can find instructions on how someone can identify and deal with suspicious emails:


  • Upon the receipt of any email ask yourselves these two questions:

1.    “Do I know the sender?”

2.    “Am I expecting such an email from this person?”

If the answer to both questions is no, delete the email immediately.


Read more at CPM blog here or CPF blog here


CPM and CPF are proud members of Delphi Alliance in Cyprus.

Comments


Commenting has been turned off.
bottom of page