Requests for sensitive or strange information


In a world of digital deception, your scepticism
is the shield that guards your data.

In our previous article, we spoke about email scammers impersonating organisations and individuals and the various ways you can spot a charlatan before falling victim to their tactics.

What are email scams and how do I spot them?

Email scams and phishing attacks often rely on deceptive links and infected attachments to trick unsuspecting recipients into compromising their security. Cybercriminals may employ various tactics to entice you into clicking on malicious links or downloading harmful files. Staying vigilant and recognizing the warning signs can help you avoid falling victim to these schemes.

How do I know if a link in an email is safe?

One effective strategy to assess the legitimacy of a link is by hovering your mouse cursor over a document or a link without actually clicking on it. This action will reveal the URL associated with the link. If the URL appears suspicious, contains unusual characters, or differs from the expected destination, it's best to avoid clicking. Legitimate organisations typically use recognizable and trustworthy domain names in their links.

Should I open attachments in an email?

Attachments, especially those from unknown or unexpected senders, warrant more caution. Cybercriminals may disguise malware or viruses within seemingly innocent file attachments, such as PDFs or Word documents. Exercise restraint when downloading attachments, even if they appear harmless at first glance. Only open attachments from trusted sources, and consider scanning them with up-to-date security software before opening.

Do I need antivirus software to protect against scams?

To further protect yourself, consider using reputable antivirus software and keeping it regularly updated. If you’re on a budget, the default Windows antivirus, Windows Defender, works great.

By maintaining a strong defence against bad and bogus links as well as infected attachments, you can strengthen your digital security and prevent potential threats from infiltrating your system.

Stay safe, stay tech-smart!

More in this series

Leave a Comment

You must be logged in to post a comment.