{"id":100909,"date":"2024-06-28T23:32:31","date_gmt":"2024-06-28T23:32:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/what-to-do-phishing-email\/"},"modified":"2024-06-28T23:32:31","modified_gmt":"2024-06-28T23:32:31","slug":"what-to-do-phishing-email","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/what-to-do-phishing-email\/","title":{"rendered":"Protect Yourself: How to Respond to Phishing Emails"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>It\u2019s important to be careful when it comes to online security. You never know when\u2064 you may fall victim \u200bto a phishing email, which is \u200cwhy it\u2019s vital to understand the basics of what to do with a phishing email. With this guide, you\u2019ll learn \u200dthe basics of staying secure \u200cfrom phishing threats, as well as what to do if you end up being the target\u2062 of a phishing attack. By understanding how to better protect \u2062your information \u200bonline, you can reduce the risk of falling victim to a phishing scam. With \u2064the right precautions, you\u200c can stay safe from phishing emails \u200cand better secure your \u200ddata against cyber thefts and malicious hacking.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/what-to-do-phishing-email\/#1_Identifying_Phishing_Emails\" >1. Identifying Phishing Emails<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/what-to-do-phishing-email\/#2_How_to_Avoid%E2%81%A3_Falling_for%E2%80%8C_Phishing_Emails\" >2. How to Avoid\u2063 Falling for\u200c Phishing Emails<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/what-to-do-phishing-email\/#3_How%E2%81%A2_to_Report_and_Delete_Phishing_%E2%80%8CEmails\" >3. How\u2062 to Report and Delete Phishing \u200cEmails<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/what-to-do-phishing-email\/#4_Take_Control_with_Anti-Phishing_Strategies\" >4. Take Control with Anti-Phishing Strategies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/what-to-do-phishing-email\/#Q_A\" >Q&amp;A<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-identifying-phishing-emails\"><span class=\"ez-toc-section\" id=\"1_Identifying_Phishing_Emails\"><\/span>1. Identifying Phishing Emails<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Staying vigilant in the\u200c digital age<\/b> is a\u2063 key component \u200dof \u2062logical cybersecurity \u2063knowledge. Being able to identify potentially malicious websites\u2064 and emails is a \u200bvital skill. Phishing emails\u200c are sent out every day, cleverly crafted to steal personal data. Not all of these malicious emails are easy to identify, but \u200bwith\u2062 the right knowledge, you can protect \u200dyourself.<\/p>\n<p><b>Understanding the signs of phishing<\/b> is the first step to safety. These\u2064 emails always try to prompt you \u2064into action with urgent requests. They may promise something too good to be true, like large amounts\u2062 of money. Spelling and grammar are often poor, though they are becoming harder to spot. Many \u2062phishing emails can\u2063 contain:<\/p>\n<ul>\n<li>Threats \u200band demands<\/li>\n<li>Unasked for attachments that may contain\u2063 viruses or\u200d malicious files<\/li>\n<li>Requests for personal \u200binformation<\/li>\n<li>Phony links or requests to update accounts<\/li>\n<\/ul>\n<p>Phishing emails are often similar to legitimate emails, but subtle differences can be spotted. The URL may \u2064be\u2063 slightly different than what you\u2019re used to or the sender\u2019s address may be unfamiliar. When in doubt, contact the organization the email claims to be from to check \u200bit\u2019s \u200dauthenticity. Above \u200call, <b>always be mindful of emails that look suspicious<\/b> and never\u2062 provide any personal information.<\/p>\n<h2 id=\"2-how-to-avoid-falling-for-phishing-emails\"><span class=\"ez-toc-section\" id=\"2_How_to_Avoid%E2%81%A3_Falling_for%E2%80%8C_Phishing_Emails\"><\/span>2. How to Avoid\u2063 Falling for\u200c Phishing Emails<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Phishing emails can be difficult to spot, but \u2062with some savvy strategies, you can protect yourself from becoming a victim. <\/strong><\/p>\n<p>Take the\u200c time to read emails carefully before clicking on any links or downloading any\u2062 attachments. Be on the\u2063 look out for suspicious signs like poor grammar, misspellings, and \u2062odd requests. It\u2019s unlikely you would \u200cexpect professional correspondence to \u200dcontain this type of sloppy writing.<\/p>\n<ul>\n<li>Avoid clicking any links in emails \u200bfrom unreliable sources. If \u200bnecessary, open a new browser window and type in the URL instead.<\/li>\n<li>Verify the\u2063 sender is legitimate by carefully checking the email address. Some scam emails\u2064 will replicate popular domains and \u2064pluck a\u2063 few names from address books.<\/li>\n<li>Check for requests for personal information and verify if the company has\u2063 asked \u2064for this information\u2062 in the past. Do not respond to prompt\u2063 asking for login credentials, passwords, or any\u2062 other confidential data.<\/li>\n<\/ul>\n<p>Be alert\u2062 and use common sense.\u200d If an email looks suspicious, it\u2019s better to delete\u200d it entirely than\u2062 risk clicking something \u2064you shouldn\u2019t.<\/p>\n<h2 id=\"3-how-to-report-and-delete-phishing-emails\"><span class=\"ez-toc-section\" id=\"3_How%E2%81%A2_to_Report_and_Delete_Phishing_%E2%80%8CEmails\"><\/span>3. How\u2062 to Report and Delete Phishing \u200cEmails<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>It is important for \u200ceveryone\u2063 to be aware of the types of emails to\u200b watch out for, in \u2064order to prevent yourself from becoming \u200da\u2064 victim of a phishing attack. Knowing \u200dwhat steps to take when \u200dyou recognize a \u2064possible phishing email is essential to protect your\u200d personal information.<\/p>\n<p>Identifying a \u200bphishing email may be difficult, as they can look legitimate. Below \u200dare warning signs that will help you determine if\u200d an\u2064 email is malicious:<\/p>\n<ul>\n<li>Poor spelling \u200cand grammar<\/li>\n<li>Generic salutation e.g. \u2018Dear valued customer\u2019<\/li>\n<li>Unexpected attachments<\/li>\n<li>Requests for personal information<\/li>\n<\/ul>\n<p>If you suspect\u2062 an email may \u200dbe a phishing attempt, always delete it. Additionally, \u2064you should report it to your email provider, so they\u200d can recognize it as malicious and take appropriate\u2063 action. Doing this will help to protect yourself and any other user who may receive this malicious\u2064 email.<\/p>\n<h2 id=\"4-take-control-with-anti-phishing-strategies\"><span class=\"ez-toc-section\" id=\"4_Take_Control_with_Anti-Phishing_Strategies\"><\/span>4. Take Control with Anti-Phishing Strategies<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Phishing is the use of emails,\u200c phone calls, or\u2064 texts to trick people into selling fraud \u200dor\u200c other malicious\u200d activities. To protect \u2064yourself against it, there \u200dare a few anti-phishing strategies you can employ.<\/p>\n<ul>\n<li><strong>Beware of opt-in settings:<\/strong> Before you agree to have your contact information shared, ensure you understand what is being shared and what it \u200bentails.<\/li>\n<li><strong>Be aware of phishing emails:<\/strong> Look for indicators like a fake \u2062return address, poor spelling or grammar, lack of company email\u2064 information, and \u200cgeneric greetings.<\/li>\n<li><strong>Don\u2019t click unknown\u200c links:<\/strong> It\u2019s best to avoid\u200c clicking on links from emails you don\u2019t recognize. Hacked sites and malicious\u2062 links are often embedded in emails.<\/li>\n<\/ul>\n<p>When it comes to \u2063safeguarding yourself from phishing attacks, it\u2019s best to be vigilant. Immediately delete questionable emails and never <a href=\"https:\/\/logmeonce.com\/business-total-security\/\">leave personal information fields blank<\/a>\u200d on websites or\u200b forms. Taking precautions when using emails or social media, such as keeping your information secure, is key \u200cfor preventing scams.<\/p>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is \u200bPhishing?<\/p>\n<p>A: Phishing is when \u2063scammers send out malicious emails or\u200d messages, often disguised as coming from a reputable company, \u200dto try to get your personal information like\u2062 passwords, credit\u2063 card numbers, or other private information.<\/p>\n<p>Q:\u200d What should I do if I receive a phishing\u200c email?<\/p>\n<p>A: It\u2019s important \u200bto stay alert if you receive\u2064 a phishing email. First, make sure not \u200cto click on\u2062 any links or attachments in the email. \u2064Then, delete the email right away. You may also want to report the\u200b email to your email provider or the company it claims to \u200cbe from.<\/p>\n<p>Protecting yourself from phishing emails has never been easier. Keep yourself safe and secure \u200dby creating a FREE LogMeOnce account with Auto-login and SSO, and \u200cprotecting yourself from phishing scams forever. You can check out <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce.com<\/a> to find the perfect solution for \u200cwhat to do \u200babout phishing emails, with the industry\u2019s\u2063 best anti-phishing technology. LogMeOnce provides the most trusted anti-phishing solutions for ensuring \u200dsafe \u200dweb browsing and \u2063emailing. Take the step today and protect yourself from harmful phishing emails \u2062with LogMeOnce.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>It\u2019s important to be careful when it comes to online security. You never know when\u2064 you may fall victim \u200bto a phishing email, which is \u200cwhy it\u2019s vital to understand the basics of what to do with a phishing email. With this guide, you\u2019ll learn \u200dthe basics of staying secure \u200cfrom phishing threats, as well [&hellip;]<\/p>\n","protected":false},"author":23,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19736],"tags":[935,3765,939,2080,16154,29031,811,27341,35173,781],"class_list":["post-100909","post","type-post","status-publish","format-standard","hentry","category-single-sign-on","tag-cybersecurity","tag-data-protection-2","tag-phishing","tag-email","tag-email-scams","tag-internet-fraud","tag-online-safety","tag-phishing-emails","tag-prevent-fraud","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/100909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=100909"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/100909\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=100909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=100909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=100909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}