- Are you expecting this email? - Have you dealt with this person/company before? - Do you feel unsure about this email?
A targeted attack could make use of available information to make the email/invoice appear to be from a legitimate supplier, using their branding, display name and a similar looking email address. An attacker can find information from published lists, portfolios & case studies, reconnaissance via phone or email enquires, or based off of another attack where data was extracted.
Look.
Look for the signs of a fake email or scam
Think.
Think if those signs are a concern
Check.
Check the legitimacy using known channels
What Happens If You Click The Link?
You are directed to a sign in page to access the document which is a fake login screen designed to steal your credentials and use them to access your systems & accounts.
What About Attachments & Downloads?
An attachment such as a PDF or Word document can contain bad code which runs when you open the document and can infect your computer with malware to steal information, ransom your files or spread itself to others while awaiting further commands.
What to do if you Get an Email That is Suspicious?
If the email looks real but you have doubts contact them via a known phone number or contact us for a sense check at support@westwayit.co.uk or call 01452 491080
John Fisher
Meet John Fisher, founder of Westway IT, passionate about helping businesses thrive with technology. With a BSc in Computer Science, he values integrity, education, and quality relationships. Active in The Tech Tribe and CompTIA, John simplifies IT and creates scalable strategies. Connect with him on LinkedIn.