Since email became a thing for everyone, there have been people who use it to try to get money (or other things) out of others.
Many of the companies that provide our email are doing their best but would you recognise a scam email or email scams, if you received it?
Emails have been and remain a very popular way for hackers and nefarious computer users to try to get you to download some code onto your computer or click on a link.
Going to a fake website will often ask you ‘sign in’, but what you’re really doing is giving them your email, username and a password.
What ideally you need to do, is not click on that scam link.
Of course to do that, you need to know what to look out for, to find these types of messages.
This is a screenshot of my junk email folder.
These are messages that my email provider has automatically picked up on as being fake or unwanted messages.
Remember that your email company will do the best that they can, but things are changing fast, and you need to be vigilant as well.
Things for you to look out for:
Note: These are general guidelines to follow, and not a complete list. Remember – not all emails are fake!
Is it from a company that you know?
If the sender is a company that you’ve never heard of, then think carefully before clicking on any links.
Also be aware of the difference between the company name and product names.
For example Windows is a product from Microsoft, Windows will never be contacting you… đ Though it’s unlikely that Microsoft will either – at least not asking you to click on a link. They will normally send your reminders.
Check the spelling of the company name.
Perhaps it is a company that you know or have heard from – eg Mcaffee. You can see a few emails from them above – first they are McAfee. Note that both the M and A are capital on the real company.
Next check if they have added characters – for instance extra dots or dashes, or names.
Above you can see that I’ve got emails from Mcafee Securite (not Security) and Partner. The real company is known simply as McAffee.
The same goes for the email address the message was sent from:
support@amazan.com | support@amazon.ie.com | support@amazon-e.com
They are all examples of how at first glance an email address can look correct, but none of these are.
If you don’t see the full email address, click on the name (it’s fine to do that), or hover over it – carefully read what’s actually there, not just what you’re assuming.
Do you actually have an account or use that company?
In some cases it’s really easy to know that these are fake.
For example – I don’t have an account with McAfee. Therefore they would never send me a message stating that my account is due to expire.
Are you expecting an email?
Do you know when subscriptions are due for renewal? So many of these messages say it’s about to expire, make sure that if it is a company that you use, you know when they are likely to contact you.
Next Steps
The best tool that you have is to have in your cyber security essentials ‘pack’ is common sense when using the internet.
Be cautious of suspicious websites, emails, and messages. If something seems too good to be true, it probably is. Trust your instincts and stay safe online.
Don’t trust links in unknown or unexpected emails. Instead go to your web-browser and enter the address for the company. Sign in to check what’s happening with your account.
Better safe than sorry
For more tips take a look at my YouTube channel – Michelle Kaye
Other Data Security Posts
Let’s talk basic cyber security essentials
How to stay safe from email scams (current post)
What are good password practices?
Do you really need a password manager?
How many email addresses do you need?
Recent Posts
- Do you want computer peripherals with that?Youâve sorted out the hardware, the best device and software but have you thought about any additional computer equipment that you might need for your business a.k.a. the computer peripherals? The first thing is to agree on what is a âcomputer peripheralâ. The definition that appears when you google it, is: A peripheral device, or⌠Read more: Do you want computer peripherals with that?
- Improve your results with these advanced search techniquesWeâve now looked at searching, and hopefully youâre finding your files easily. But how often are the ones that youâre looking for at the top of the results list? Let me share some advanced search techniques with you. Wildcard symbols How often have you remembered part of the filename, but not all of it? There⌠Read more: Improve your results with these advanced search techniques
- Are you searching your files to save time?How often have you spent hours looking for a file that you know is saved somewhere? Then my question is why? Searching your files is a quicker way to find what youâre looking for! OK, OK, I can hear you saying âI already know how to search Michelle!â But do you? Really? Iâm talking about⌠Read more: Are you searching your files to save time?
- Talking without the video = podcastMaybe youâve got a lot to say (not just supercalifragilisticexpialidocious) but you donât like seeing or recording yourself. In this case take a look at the podcast option. Sure youâre recording your voice but thatâs it! Whatâs a podcast? Well a dictionary definition is âa digital audio file made available on the internet for downloading⌠Read more: Talking without the video = podcast
- Is a video channel more your thing?Maybe your expertise is better shared through a video channel? If your skills are best when you show or demonstrate things to people then this may be the perfect channel option for you. Iâm not going to insult you by explaining what a video is, but letâs talk about a few things related to a⌠Read more: Is a video channel more your thing?
how to stay safe from email scams, how to stay safe using email, how to avoid scam emails
3 thoughts on “How to stay safe from email scams”
Pingback: Let's talk basic cyber security essentials
Pingback: What are good password practices?
Pingback: How many email addresses do you need?
Comments are closed.