SlideShare a Scribd company logo
What every physician
needs to know:
how to detect email fraud
? phishing
•	 Email fraud is also known as phishing or spear
phishing.
•	 Phishing – an attempt by cyber criminals who use an
email message that appears to come from a trustworthy
source to get a recipient to provide sensitive or private
information, such as a username, password, credit card
number, or other secure data.
1 spelling & bad
grammar
•	 If you notice spelling or grammar mistakes in an
email, it might be a scam – especially if the email
appears to come from an organization you do business
with. Legitimate businesses have communication
departments or staff who review and edit email before
sending it to customers.
1 spelling & bad
grammar
•	 Check for proper spelling in web addresses as well.
Cyber criminals use web addresses that resemble
the names of well-known companies but are slightly
altered.
threats
2•	 Email scams will entice you to respond to the message
by threatening to close an account or by threatening
another type of action. Legitimate institutions,
particularly banks, do not typically communicate this
way or ask you to click on a link in an email. Do not
reply, click on links, or call phone numbers provided in
the message.
threats
2•	 Contact the institution directly using contact
information you know to be correct if you have any
doubts or questions.
•	 This also applies to emails with requests for urgent
responses.
links
•	 You can preview a link in an email message, without
having to click on it, by hovering your cursor over the
link. Either a small text box will appear with the full web
address or it will appear in the lower left corner of your
browser window.
3
links
•	 If the link appears suspicious or does not match the
link in the message, do not click on it. These links can
direct you to spoofing sites or lead you to .exe files,
which can spread malicious software.
3
4•	 If the email message is asking you to confirm or provide
personal information, do not reply. Email is not a secure
method for sharing sensitive information, and legitimate
businesses do not ask you to send information this way.
asking for
personal
information
5•	 Files attached in an email could contain viruses or other
malware that can weaken your computer’s security. If
you think you received a phishing email do not open or
download any attachments.
suspicious
attachments
6•	 The next slide demonstrates a real-life example of a
phishing attempt.
email fraud
example
Ref. EF54325-EE14555-0456531
Dear Amazon Client,
Your account will be closed because a violation of our term of use
We Investigated in this issue and found a fraudulent activity from another ip address.
In this activity a fraudulent transactions and more suspicious activity from an unknown
computer.
Please verify your identity for we can process this issue
We recommend follow this steps below carefully :
>identity verification
This is a big risk to our customers you will take all responsibility for this issue.
As well if you didn’t complete the steps with all required information we will give this
issueto the US Security Department.
Thanks,
Security Team
7•	 Look for these signs if you receive a suspicious email:
•	 Generic greeting (not your name)
•	 Bad spelling or grammar
•	 Requests for personal information
•	 Threats and/or requests for an urgent response
•	 Spoofed links
•	 When you’re unsure about the legitmacy of an email
either call the sender or contact your security officer, IT
staff, or consultant.
email fraud
check list
protection for
a new era of
medicine
about tmlt:
With more than 18,000 physicians in its care, Texas Medical
Liability Trust (TMLT) provides malpractice insurance and related
products to physicians. Our purpose is to make a positive impact
on the quality of health care for patients by educating, protecting,
and defending physicians. www.tmlt.org
8
Find us on:

More Related Content

PDF
Gone Phishing Infographic
DOCX
Security awareness
PPTX
Phishing 1 vp
PPTX
Internet Fraud #scichallenge2017
PDF
Phishing email checklist slideshare1
PPS
Common Email Security Mistakes
PDF
RP Phishing Awareness
PPTX
PHISHING attack
Gone Phishing Infographic
Security awareness
Phishing 1 vp
Internet Fraud #scichallenge2017
Phishing email checklist slideshare1
Common Email Security Mistakes
RP Phishing Awareness
PHISHING attack

What's hot (20)

PDF
Test Your Internet Security IQ Quiz
PPTX
Deliverability webinar ppt show
PDF
higi Salesforce integration demo
PPTX
Dilemma #7
PDF
No one cares about your damn emails
PDF
PPTX
How to Detect and Prevent Money Scams
PPTX
7 social engineering and insider threats
PPTX
Email chap 2
PPTX
Advertising Through Email
PDF
DoD Social Media Guide
PPTX
Social Media Risks
PDF
10 tips to prevent phishing attacks
PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
PDF
Online registration 25 aug14
PPTX
Phishing technology
PPTX
Seminar on yahoo mail cyber attack
PPTX
Phishing technology
PDF
The Electronic Mail Data Will Be Published On The Web !
PPT
Practical Solutions To Internet Marketing Legal Compliance, pt 2
Test Your Internet Security IQ Quiz
Deliverability webinar ppt show
higi Salesforce integration demo
Dilemma #7
No one cares about your damn emails
How to Detect and Prevent Money Scams
7 social engineering and insider threats
Email chap 2
Advertising Through Email
DoD Social Media Guide
Social Media Risks
10 tips to prevent phishing attacks
Phishing Scams: 8 Helpful Tips to Keep You Safe
Online registration 25 aug14
Phishing technology
Seminar on yahoo mail cyber attack
Phishing technology
The Electronic Mail Data Will Be Published On The Web !
Practical Solutions To Internet Marketing Legal Compliance, pt 2
Ad

Viewers also liked (16)

PDF
Authentication Best Practices
PDF
What Every Physician Needs to Know About Their Malpractice Insurance Policy
PDF
Terminating the Physician-Patient Relationship, Part 2
PDF
Failure to communicate MRI results
PDF
Tips for Handling Patient Complaints
PDF
Things to Consider Before Buying Cyber Liability Insurance
PDF
Failure to insist on EMS transport
PDF
Communicating with Patients After Adverse Outcomes
PDF
Terminating the Physician-Patient Relationship, Part 1
PDF
EHR Best Practices
PDF
Overprescribing pain medication
PDF
The Medical Malpractice Claims Process
PDF
Social Media and the Web
PDF
Communicating With Patients in the Digital Age
PDF
Winners of 2016 SXSW Health & MedTech
PDF
Top 5 Physician Websites
Authentication Best Practices
What Every Physician Needs to Know About Their Malpractice Insurance Policy
Terminating the Physician-Patient Relationship, Part 2
Failure to communicate MRI results
Tips for Handling Patient Complaints
Things to Consider Before Buying Cyber Liability Insurance
Failure to insist on EMS transport
Communicating with Patients After Adverse Outcomes
Terminating the Physician-Patient Relationship, Part 1
EHR Best Practices
Overprescribing pain medication
The Medical Malpractice Claims Process
Social Media and the Web
Communicating With Patients in the Digital Age
Winners of 2016 SXSW Health & MedTech
Top 5 Physician Websites
Ad

Similar to How to Detect Email Fraud (20)

PDF
Anatomy of a Malicious Email – What to Look For
PDF
phishing facts be aware and do not take the bait
PPTX
Presentation on Email phishing.pptx
PPTX
IS Presetation.pptx
PPSX
IDENTIFYING CYBER THREATS NEAR YOU
PPTX
phishing and reporting emailfdlhl;glllfd
PPTX
phishingsssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss...
PDF
Keeping Your Email Secure
PDF
Lesson learned from linked in
PPTX
Phishing 101 Presentation.pptx............
PPT
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
PDF
Phishing email PDF Flyer
PDF
Types Of Smishing Attack – Signs And Prevention
PDF
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
PDF
Cybersecurity Awareness Posters - Set #2
PPTX
E mail etiquettes
PPTX
phishing-awareness-powerpoint.pptx
PPTX
Phishing
PDF
Understanding Phishing E-Mail Scams
PDF
Get Cheating Evidence Through Email Hacks Service
Anatomy of a Malicious Email – What to Look For
phishing facts be aware and do not take the bait
Presentation on Email phishing.pptx
IS Presetation.pptx
IDENTIFYING CYBER THREATS NEAR YOU
phishing and reporting emailfdlhl;glllfd
phishingsssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss...
Keeping Your Email Secure
Lesson learned from linked in
Phishing 101 Presentation.pptx............
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
Phishing email PDF Flyer
Types Of Smishing Attack – Signs And Prevention
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
Cybersecurity Awareness Posters - Set #2
E mail etiquettes
phishing-awareness-powerpoint.pptx
Phishing
Understanding Phishing E-Mail Scams
Get Cheating Evidence Through Email Hacks Service

More from Texas Medical Liability Trust (20)

PDF
TMB pain management rules
PDF
Telemedicine: Managing your risks
PDF
Cultural Competency
PDF
COVID-19 Re-opening Your Practice
PDF
Texas COVID-19 regulatory changes
PDF
Strategies to Improve Patient Follow Up
PDF
Telemedicine and Telehealth
PDF
Medical Malpractice Claim Trends
PDF
10 Things That Compromise Patient Data
PDF
Human Trafficking, Part 2
PDF
Human Trafficking, Part 1
PDF
Risk Management Trends
PDF
Ransomware attacks
PDF
Addressing transgender health care disparities
PDF
Case Closed: HIPAA and patient privacy
PDF
Googling Your Patients
PDF
CDC Guidelines for Prescribing Opioids
PDF
Top 10 Risk Management Recommendations
PDF
Combating Physician Stress and Burnout
PDF
Wernicke's Encephalopathy After Bariatric Surgery
TMB pain management rules
Telemedicine: Managing your risks
Cultural Competency
COVID-19 Re-opening Your Practice
Texas COVID-19 regulatory changes
Strategies to Improve Patient Follow Up
Telemedicine and Telehealth
Medical Malpractice Claim Trends
10 Things That Compromise Patient Data
Human Trafficking, Part 2
Human Trafficking, Part 1
Risk Management Trends
Ransomware attacks
Addressing transgender health care disparities
Case Closed: HIPAA and patient privacy
Googling Your Patients
CDC Guidelines for Prescribing Opioids
Top 10 Risk Management Recommendations
Combating Physician Stress and Burnout
Wernicke's Encephalopathy After Bariatric Surgery

Recently uploaded (20)

PPTX
Vaginal Bleeding and Uterine Fibroids p
PPTX
1. Drug Distribution System.pptt b pharmacy
PPTX
Basics of pharmacology (Pharmacology I).pptx
PPT
Parental-Carer-mental-illness-and-Potential-impact-on-Dependant-Children.ppt
PDF
2E-Learning-Together...PICS-PCISF con.pdf
PDF
Dr. Jasvant Modi - Passionate About Philanthropy
PPT
Adrenergic drugs (sympathomimetics ).ppt
PPTX
Genaralised anxiety disorder presentation
PPTX
HEMODYNAMICS - I DERANGEMENTS OF BODY FLUIDS.pptx
PDF
Dr Masood Ahmed Expertise And Sucess Story
PDF
CHAPTER 9 MEETING SAFETY NEEDS FOR OLDER ADULTS.pdf
PDF
Dermatology diseases Index August 2025.pdf
PPTX
First aid in common emergency conditions.pptx
PPTX
General Pharmacology by Nandini Ratne, Nagpur College of Pharmacy, Hingna Roa...
PPTX
3. Adherance Complianace.pptx pharmacy pci
PPT
KULIAH UG WANITA Prof Endang 121110 (1).ppt
PPTX
COMMUNICATION SKILSS IN NURSING PRACTICE
PPTX
Pulmonary Circulation PPT final for easy
PDF
Structure Composition and Mechanical Properties of Australian O.pdf
PPTX
Infection prevention and control for medical students
Vaginal Bleeding and Uterine Fibroids p
1. Drug Distribution System.pptt b pharmacy
Basics of pharmacology (Pharmacology I).pptx
Parental-Carer-mental-illness-and-Potential-impact-on-Dependant-Children.ppt
2E-Learning-Together...PICS-PCISF con.pdf
Dr. Jasvant Modi - Passionate About Philanthropy
Adrenergic drugs (sympathomimetics ).ppt
Genaralised anxiety disorder presentation
HEMODYNAMICS - I DERANGEMENTS OF BODY FLUIDS.pptx
Dr Masood Ahmed Expertise And Sucess Story
CHAPTER 9 MEETING SAFETY NEEDS FOR OLDER ADULTS.pdf
Dermatology diseases Index August 2025.pdf
First aid in common emergency conditions.pptx
General Pharmacology by Nandini Ratne, Nagpur College of Pharmacy, Hingna Roa...
3. Adherance Complianace.pptx pharmacy pci
KULIAH UG WANITA Prof Endang 121110 (1).ppt
COMMUNICATION SKILSS IN NURSING PRACTICE
Pulmonary Circulation PPT final for easy
Structure Composition and Mechanical Properties of Australian O.pdf
Infection prevention and control for medical students

How to Detect Email Fraud

  • 1. What every physician needs to know: how to detect email fraud
  • 2. ? phishing • Email fraud is also known as phishing or spear phishing. • Phishing – an attempt by cyber criminals who use an email message that appears to come from a trustworthy source to get a recipient to provide sensitive or private information, such as a username, password, credit card number, or other secure data.
  • 3. 1 spelling & bad grammar • If you notice spelling or grammar mistakes in an email, it might be a scam – especially if the email appears to come from an organization you do business with. Legitimate businesses have communication departments or staff who review and edit email before sending it to customers.
  • 4. 1 spelling & bad grammar • Check for proper spelling in web addresses as well. Cyber criminals use web addresses that resemble the names of well-known companies but are slightly altered.
  • 5. threats 2• Email scams will entice you to respond to the message by threatening to close an account or by threatening another type of action. Legitimate institutions, particularly banks, do not typically communicate this way or ask you to click on a link in an email. Do not reply, click on links, or call phone numbers provided in the message.
  • 6. threats 2• Contact the institution directly using contact information you know to be correct if you have any doubts or questions. • This also applies to emails with requests for urgent responses.
  • 7. links • You can preview a link in an email message, without having to click on it, by hovering your cursor over the link. Either a small text box will appear with the full web address or it will appear in the lower left corner of your browser window. 3
  • 8. links • If the link appears suspicious or does not match the link in the message, do not click on it. These links can direct you to spoofing sites or lead you to .exe files, which can spread malicious software. 3
  • 9. 4• If the email message is asking you to confirm or provide personal information, do not reply. Email is not a secure method for sharing sensitive information, and legitimate businesses do not ask you to send information this way. asking for personal information
  • 10. 5• Files attached in an email could contain viruses or other malware that can weaken your computer’s security. If you think you received a phishing email do not open or download any attachments. suspicious attachments
  • 11. 6• The next slide demonstrates a real-life example of a phishing attempt. email fraud example
  • 12. Ref. EF54325-EE14555-0456531 Dear Amazon Client, Your account will be closed because a violation of our term of use We Investigated in this issue and found a fraudulent activity from another ip address. In this activity a fraudulent transactions and more suspicious activity from an unknown computer. Please verify your identity for we can process this issue We recommend follow this steps below carefully : >identity verification This is a big risk to our customers you will take all responsibility for this issue. As well if you didn’t complete the steps with all required information we will give this issueto the US Security Department. Thanks, Security Team
  • 13. 7• Look for these signs if you receive a suspicious email: • Generic greeting (not your name) • Bad spelling or grammar • Requests for personal information • Threats and/or requests for an urgent response • Spoofed links • When you’re unsure about the legitmacy of an email either call the sender or contact your security officer, IT staff, or consultant. email fraud check list
  • 14. protection for a new era of medicine about tmlt: With more than 18,000 physicians in its care, Texas Medical Liability Trust (TMLT) provides malpractice insurance and related products to physicians. Our purpose is to make a positive impact on the quality of health care for patients by educating, protecting, and defending physicians. www.tmlt.org 8 Find us on: