SlideShare a Scribd company logo
The MUST Read Check-
list
BEFORE you open your emails
4 points to consider….
1. Do you know
the sender and are
you expecting an
email from them?
2. Can you verify the sender
email address and details?
(be sure to check for small
differences, wrong spellings
and so forth)
This example shown has an extra ‘S’
where people may not notice.
3. What action are you be-
ing asked to make? If you
are required to click on a
link try hovering over it
with your cursor to see if
you get an
clues
about
where it
might take
you.
Do not
click if you are unsure,
make a phone call if
you need to check.
4. More
clues to
look out
for are
the use of
urgency
and re-
quests
for personal information or
money. When you receive a
suspicious email you can
forward them to:
report@phishing.gov.uk
The NCSC investigate reports and seek to block and re-
move malicious links and addresses
www.trustedcomputing.ltd
0161 240 1414
Follow us for more IT and
cyber security hints and tips

More Related Content

PDF
How to Detect Email Fraud
PDF
RP Phishing Awareness
PPTX
Phishing 1 vp
PDF
Understanding Phishing E-Mail Scams
PPTX
Phishing
PPT
Using a reverse phone lookup service
PPTX
Internet Fraud #scichallenge2017
PPTX
PHISHING attack
How to Detect Email Fraud
RP Phishing Awareness
Phishing 1 vp
Understanding Phishing E-Mail Scams
Phishing
Using a reverse phone lookup service
Internet Fraud #scichallenge2017
PHISHING attack

What's hot (20)

ODP
phishing and pharming - evil twins
PPTX
11 ways to keep your emails safe from hackers
PPTX
The Difference between Pharming and Phishing
DOCX
Online secuirty
PPTX
PPS
Common Email Security Mistakes
PPTX
Identity theft
PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
PDF
Corporate Investigations for the Security of Your Enterprise
PDF
Phishing email PDF Flyer
PPTX
Phishing attack
PPT
Phishing
PPT
P H I S H I N G
PPTX
Phishing technology
PPT
Identity Theft
PPSX
IDENTIFYING CYBER THREATS NEAR YOU
PPT
Phishing-Updated
PPT
Phishing
PDF
PhishingandPharming
PPTX
Phishing technology
phishing and pharming - evil twins
11 ways to keep your emails safe from hackers
The Difference between Pharming and Phishing
Online secuirty
Common Email Security Mistakes
Identity theft
Phishing Scams: 8 Helpful Tips to Keep You Safe
Corporate Investigations for the Security of Your Enterprise
Phishing email PDF Flyer
Phishing attack
Phishing
P H I S H I N G
Phishing technology
Identity Theft
IDENTIFYING CYBER THREATS NEAR YOU
Phishing-Updated
Phishing
PhishingandPharming
Phishing technology
Ad

Similar to Phishing email checklist slideshare1 (20)

PPT
PPTX
Email hacking
DOCX
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
DOCX
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
PPSX
West Chester - Tech Training Session 11
DOCX
Security awareness
PPTX
Email Security Awareness
PPT
Email basics
PPTX
Email security netwroking
PDF
Anatomy of a Malicious Email – What to Look For
PPTX
StayVigilantProtectYourEmailAccount.pptx
PDF
"Tips For Detecting A Phishing Email" Infographic
PPTX
Tech Training - Session 8
PDF
Is this a scam.pdf
PDF
Internet Safety for 1950s Adults and Beginners
PPTX
Email Security: The Threat Landscape
PPT
gmail-emailSafety.ppt
PPT
gmail-emailSafety.ppt
PPTX
IS Presetation.pptx
PPTX
Eric Dearbeck Security PowerPoint
Email hacking
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
West Chester - Tech Training Session 11
Security awareness
Email Security Awareness
Email basics
Email security netwroking
Anatomy of a Malicious Email – What to Look For
StayVigilantProtectYourEmailAccount.pptx
"Tips For Detecting A Phishing Email" Infographic
Tech Training - Session 8
Is this a scam.pdf
Internet Safety for 1950s Adults and Beginners
Email Security: The Threat Landscape
gmail-emailSafety.ppt
gmail-emailSafety.ppt
IS Presetation.pptx
Eric Dearbeck Security PowerPoint
Ad

Recently uploaded (20)

PDF
Unit 1 Cost Accounting - Cost sheet
PDF
Types of control:Qualitative vs Quantitative
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
A Brief Introduction About Julia Allison
PPT
Chapter four Project-Preparation material
PPTX
Lecture (1)-Introduction.pptx business communication
PPTX
Principles of Marketing, Industrial, Consumers,
DOCX
Business Management - unit 1 and 2
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PPTX
5 Stages of group development guide.pptx
PDF
DOC-20250806-WA0002._20250806_112011_0000.pdf
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PDF
Digital Marketing & E-commerce Certificate Glossary.pdf.................
PPTX
HR Introduction Slide (1).pptx on hr intro
Unit 1 Cost Accounting - Cost sheet
Types of control:Qualitative vs Quantitative
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
Power and position in leadershipDOC-20250808-WA0011..pdf
Nidhal Samdaie CV - International Business Consultant
A Brief Introduction About Julia Allison
Chapter four Project-Preparation material
Lecture (1)-Introduction.pptx business communication
Principles of Marketing, Industrial, Consumers,
Business Management - unit 1 and 2
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
5 Stages of group development guide.pptx
DOC-20250806-WA0002._20250806_112011_0000.pdf
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
unit 1 COST ACCOUNTING AND COST SHEET
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
Roadmap Map-digital Banking feature MB,IB,AB
Digital Marketing & E-commerce Certificate Glossary.pdf.................
HR Introduction Slide (1).pptx on hr intro

Phishing email checklist slideshare1

  • 1. The MUST Read Check- list BEFORE you open your emails 4 points to consider….
  • 2. 1. Do you know the sender and are you expecting an email from them?
  • 3. 2. Can you verify the sender email address and details? (be sure to check for small differences, wrong spellings and so forth) This example shown has an extra ‘S’ where people may not notice.
  • 4. 3. What action are you be- ing asked to make? If you are required to click on a link try hovering over it with your cursor to see if you get an clues about where it might take you. Do not click if you are unsure, make a phone call if you need to check.
  • 5. 4. More clues to look out for are the use of urgency and re- quests for personal information or money. When you receive a suspicious email you can forward them to: report@phishing.gov.uk The NCSC investigate reports and seek to block and re- move malicious links and addresses
  • 6. www.trustedcomputing.ltd 0161 240 1414 Follow us for more IT and cyber security hints and tips