Easily Identify Spam & Phishing E-mails
[Last update: 1/31/2019]
We, humans, are the weakest link when facing online security breaches, both in the office and at home.
According to a Google study, phishing is the biggest threat to our online security.
We all get phishing e-mails; some of them always make it through our filters. Those e-mails are dangerous because we can easily mistake them for a legitimate e-mail coming from a well-known company and we’ll want to click on some malicious link inside this e-mail, thinking that we’re doing the right thing. Or we may be tempted to open some attached file because the e-mail made us curious to do so or because we don’t understand what the e-mail is about and we want to check it out further.
However, by clicking on such links or opening such documents, we may provide hackers access to our personal or corporate data and maybe even give them access to our computer and from there to our whole network!
Some large corporate hacks started with such phishing e-mails. And all it takes is a single employee to fall prey for such an attack.
The most important way to prevent such data breaches is to educate ourselves and our employees in how to identify these scams and what to do about them.
So how can you tell if an e-mail is indeed coming from a known company or if it’s a phishing attempt?
In this course I will show you exactly how you can identify if an e-mail is spam or not by following a well-defined set of rules.
Throughout this course, I will use real examples from real e-mails I received to clearly illustrate everything that I teach.
I’ll also show you some e-mail settings you better define to help you out and keep you safer and I’ll also explain what to do and not to do.
This course is a MUST for everyone using e-mail in the office, at home, or on your mobile devices.
Phishing E-mails Types
Phishing Identification Rules
Tricks Used to Fool Spam Filters
Download the PDF file.
It's a checklist with all the Phishing Identification Rules for your own personal use when assessing e-mails.
Putting It All Together - Real Life Examples
Let's check your knowledge with the following examples.
Each question includes a screen capture of an e-mail.
The question will appear below the screen capture.
If I hovered over a link, you will see the URL that appears in a small popup-window, without the cursor arrow.
What To Do and NOT To Do
Download the PDF file which includes additional resources.