Since email became a thing for everyone, there have been people who use it to try to get money (or other things) out of others.
Many of the companies that provide our email are doing their best but would you recognise a scam email or email scams, if you received it?
Emails have been and remain a very popular way for hackers and nefarious computer users to try to get you to download some code onto your computer or click on a link.
Going to a fake website will often ask you ‘sign in’, but what you’re really doing is giving them your email, username and a password.
What ideally you need to do, is not click on that scam link.
Of course to do that, you need to know what to look out for, to find these types of messages.
This is a screenshot of my junk email folder.
These are messages that my email provider has automatically picked up on as being fake or unwanted messages.
Remember that your email company will do the best that they can, but things are changing fast, and you need to be vigilant as well.
Things for you to look out for:
Note: These are general guidelines to follow, and not a complete list. Remember – not all emails are fake!
Is it from a company that you know?
If the sender is a company that you’ve never heard of, then think carefully before clicking on any links.
Also be aware of the difference between the company name and product names.
For example Windows is a product from Microsoft, Windows will never be contacting you… 😅 Though it’s unlikely that Microsoft will either – at least not asking you to click on a link. They will normally send your reminders.
Check the spelling of the company name.
Perhaps it is a company that you know or have heard from – eg Mcaffee. You can see a few emails from them above – first they are McAfee. Note that both the M and A are capital on the real company.
Next check if they have added characters – for instance extra dots or dashes, or names.
Above you can see that I’ve got emails from Mcafee Securite (not Security) and Partner. The real company is known simply as McAffee.
The same goes for the email address the message was sent from:
support@amazan.com | support@amazon.ie.com | support@amazon-e.com
They are all examples of how at first glance an email address can look correct, but none of these are.
If you don’t see the full email address, click on the name (it’s fine to do that), or hover over it – carefully read what’s actually there, not just what you’re assuming.
Do you actually have an account or use that company?
In some cases it’s really easy to know that these are fake.
For example – I don’t have an account with McAfee. Therefore they would never send me a message stating that my account is due to expire.
Are you expecting an email?
Do you know when subscriptions are due for renewal? So many of these messages say it’s about to expire, make sure that if it is a company that you use, you know when they are likely to contact you.
Next Steps
The best tool that you have is to have in your cyber security essentials ‘pack’ is common sense when using the internet.
Be cautious of suspicious websites, emails, and messages. If something seems too good to be true, it probably is. Trust your instincts and stay safe online.
Don’t trust links in unknown or unexpected emails. Instead go to your web-browser and enter the address for the company. Sign in to check what’s happening with your account.
Better safe than sorry
For more tips take a look at my YouTube channel – Michelle Kaye
Other Data Security Posts
Let’s talk basic cyber security essentials
How to stay safe from email scams (current post)
What are good password practices?
Do you really need a password manager?
How many email addresses do you need?
Recent Posts
- Gemini: Google’s New AI Superpower, Explained SimplyRemember when Google was just a search engine? Well, those days are long gone. Now, they’ve got a new AI toy called Google Gemini, and it’s pretty darn impressive. Think of it as a super-smart robot assistant, but one that lives in the cloud. What Can Gemini Do? The Pros and Cons of Gemini Pros:… Read more: Gemini: Google’s New AI Superpower, Explained Simply
- Unlock Your Business Potential: A No-Nonsense Guide to Claude AIAs a business technology trainer with three decades of experience, I’ve seen countless tools promise the moon and deliver a cheese sandwich. But when it comes to artificial intelligence tools, Claude AI stands out as a genuine game-changer for small business productivity. Whether you’re looking to automate daily tasks or enhance your business operations, this… Read more: Unlock Your Business Potential: A No-Nonsense Guide to Claude AI
- ChatGPT: The Ultimate Time-Saving Sidekick for Small Business OwnersHello, fellow small business warriors! Now, unless you’ve been living under a rock (or perhaps buried under a pile of invoices), you’ve probably heard of ChatGPT for business. It’s the AI chatbot people can’t seem to stop talking about. But what can it actually do for you, the small business owner? Let’s break down the… Read more: ChatGPT: The Ultimate Time-Saving Sidekick for Small Business Owners
- AI Assistants Under The Microscope: A Trainer’s Meta-ExperienceI wanted to write a first introductory blog to explain what’s happening or happened this month. There’s been a lot of talk about AI and there are now a range of options on the market. I thought it would be interesting to join my voice to everybody else. Time to share some thoughts and options… Read more: AI Assistants Under The Microscope: A Trainer’s Meta-Experience
- Why virtual desktops are great for screen sharingWhen it comes to screen sharing, there’s a really useful feature built into today’s operating systems. Yes, it’s both Windows and Mac – virtual desktops. Let me explain what I mean and how you can use it when screen sharing. What is a Virtual Desktop? A virtual desktop is like having multiple computer screens or… Read more: Why virtual desktops are great for screen sharing
how to stay safe from email scams, how to stay safe using email, how to avoid scam emails
3 thoughts on “How to stay safe from email scams”
Pingback: Let's talk basic cyber security essentials
Pingback: What are good password practices?
Pingback: How many email addresses do you need?
Comments are closed.