Lesson 1. Does this look legitimate to you?

Years of security training have revealed a concerning pattern: traditional training often fails to prevent scams. Even experienced IT professionals fall victim to sophisticated phishing emails. However, there's a proven defense strategy—teamwork.

Let’s look at a scenario!

The Scenario

You receive an email from "IT Team" instructing you use the embedded link to reset your email password. You've never received one of these emails before, but it looks legitimate. What should you do?

Before taking any action: grab a nearby team member and ask them to review the email with you using the Five-Question Check below.

The Five-Question Check

Work through these questions together:

  1. Is the email requiring urgent action? "Your account will be closed in 24 hours" or "Payment failed - update immediately".
  2. Is the email about a password, money, or some other private matter? Is the request unusual?
  3. Is the person who sent the email a stranger or do they send it from a free email service such as hotmail.com or gmail.com?
  4. Is this an unexpected email? For example, hearing from Centrelink when you've never dealt with them before?
  5. Does the email message have grammatical or spelling errors?
If you answer "yes" to two or more questions, treat the email with extreme caution—it could be a phishing attempt.

Extra Skill - Testing the email if it has links in it.

How to Check Links Safely using the Hover technique

Place your mouse cursor over any link (don't click) to see the actual destination URL appear at the bottom of your screen or in a tooltip.

URL Red Flags

  • Mismatched domains: Email claims to be from PayPal but link goes to paypa1-secure.net
  • Numbers (IP addresses) instead of text domain names: http://192.168.1.1/login
  • Suspicious subdomains from the wrong country or company: microsoft.com.verify-login.ru 
  • Shortened URLs: bit.ly/xxxxx or tinyurl.com/xxxxx (hide the real destination)
  • Extra characters: paypa1.com (number 1 instead of letter L)

Having completed these steps, you would be highly suspicious of this emailed request.

Comments are closed.

{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}