10 Ways to detect a phishing email

10 Ways to detect a phishing email



1- Don't trust the display name of who the email is from.
Do not solely rely on the name of a person you know or trust as an assurance of the email’s authenticity.
Always verify the email address to confirm the true sender.
Email sender addresses can be easily spoofed or sent from compromised accounts, making it a common occurrence.


2- Look but don’t click:
A straightforward approach to examine a hyperlink (or URL) is to hover or move the mouse cursor over different elements of the email without clicking on anything.
If the displayed alt text appears unusual or does not correspond to the description of the link, it is advisable not to click on it.
Instead, report it to IT Department : support@edecs.com

3- Check for grammatical errors :
While anyone can make typographical errors, Stay vigilant when encountering emails with grammatical mistakes.
Scammers often rely on spellcheckers or translation tools when crafting their messages, resulting in correctly spelled words but with improper context.

4- Consider the salutation :
Attackers occasionally employ a generic or ambiguous greeting (such as “Dear valued customer”) that aligns with automated templates.
Alternatively, they may omit the salutation altogether.
While this practice does not always signify a scam, it can serve as a “red flag” if something feels amiss.

5- Is this email asking for personal information ?
Be cautious when emails ask for sensitive or personal information.
To confirm if action is needed, contact the company’s customer support or access your account directly through their official website.
It is important to note that legitimate organizations rarely request such information via email, so be cautious if emails deviate from the norm by asking for unusual help or data.

6- Be careful with attachments.
Stay cautious of enticing or seemingly normal email attachments that may harbor malware.
Avoid opening Suspicious unsolicited attachments and verify with the sender if necessary.
Beware of attachments that appear official but contain hidden malicious links, and never trust HTM/HTML attachments as they can execute code directly from your computer's memory.

7- Beware of urgency.
Exercise caution when encountering emails that employ urgency as a tactic.
Phishing emails often exploit people's trust or willingness to help by creating a sense of urgency, aiming to prompt hasty decisions.

8- Check the email signature.
Always check the email signature within the body of the email to ensure it matches the sender or the claimed identity.
Phishing attempts often involve mismatched or inconsistent email signatures when attempting to impersonate another person or co-worker.

    • Related Articles

    • Avoiding Dangerous Email Links

      Please be patient and wait for the picture to appear.
    • Do not share your password

      Below are some reasons which establish why sharing passwords is bad. 1. You compromise your account security When you share your password with another person, you essentially grant them access to not only that account, but every account you own that ...
    • Don’t Take the Bait

      What is phishing? Phishing is a form of attack that depends on tricking or fooling a victim into doing what the attacker wants. The attack begins with the attacker sending a message to the victim. It is this technique of using a message as bait to ...
    • Steps for Requesting IT Support

      1- Send an email to “Support@EDECS.COM” 2- Subject Format: - Include only the project code (e.g., "070") or "HQ" for HQ staff. - Provide a brief summary of the issue, such as: "099 - Printer Offline" Or "099 - الطابعة لا تعمل" "099 - ERP workflow ...
    • Think before you click!

      Stop, think... should I click? The concept of "think before you click" is actually one of the most important factors in terms of information security. When you receive an email, download a file(s) from the internet, or click on a link, think of the ...