Search
  • Videos
  • Windows 10
  • 5G
  • CES
  • Best VPNs
  • Cloud
  • Security
  • more
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • CES
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

How to avoid being phished during holiday shopping season

9 of 9 NEXT PREV
  • Check the sender’s address

    Check the sender’s address

    Always check both the display name and the email address of the sender. If the two do not match, or the sender's domain looks suspicious, then do not open the email.

    Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

    Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

    Photo by: Eileen Brown

    Caption by: Eileen Brown

  • Unrecognised sender

    Unrecognised sender

    If you do not have an online account with a specific brand, then you have no reason to open any email from them. 

    It could be a worm, virus, or a phishing attempt by someone who wants to get your details.

    Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

    Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

    Photo by: Eileen Brown

    Caption by: Eileen Brown

  • Valid account but unusual message

    Valid account but unusual message

    If you do have an account with the bank or brand, but the message seems to relate to something you do not remember doing, do not click on any links or open any attachments. 

    Banks will never send you impersonal messages like this. They will personalise the mail to your name and usually will include three digits of your account number or other personal details.

    Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

    Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

    Photo by: Eileen Brown

    Caption by: Eileen Brown

  • Spelling and grammar

    Spelling and grammar

    Spelling mistakes do occasionally occur, but badly written emails should be junked straight away.

    Enable two-factor authentication to avoid others taking control of your account and potentially locking you out of your own mailbox.

    Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

    Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

    Photo by: Eileen Brown

    Caption by: Eileen Brown

  • Greeting

    Greeting

    Vague greetings, such as "Hi Dear," would never come from a legitimate source. 

    Banks and other valid organisations would always use your full name when addressing you in an email.

    Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

    Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

    Photo by: Eileen Brown

    Caption by: Eileen Brown

  • Promises of money

    Promises of money

    The adage "if something seems too good to be true, it usually is" holds true for emails offering you rebates, refunds, and unasked-for cash.

    Always be suspicious. Check the link and the address. Real cash refunds are usually in response to a request for a refund.

    Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

    Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

    Photo by: Eileen Brown

    Caption by: Eileen Brown

  • Hover – do not click

    Hover – do not click

    If you see a link in your email, do not click on it. Instead hover your mouse over the visible link to see the real destination. You can then see if the link looks authentic and has no .php or other types of scripts in it. 

    Another check is to see if the link starts with https, which indicates a secure connection.

    Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

    Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

    Photo by: Eileen Brown

    Caption by: Eileen Brown

  • When in doubt

    When in doubt

    If all else fails, and you are really tempted to open the links, but you have a hunch something is wrong, check with the brand that apparently sent you the email. 

    Do not use the reply to link on the email, but contact them through their valid website, or phone number if you have any doubts.

    Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

    Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

    Photo by: Eileen Brown

    Caption by: Eileen Brown

  • Use VPNs for security

    Use VPNs for security

    VPNs provide an encrypted tunnel to prevent your credentials being stolen when you are online. a VPN could minimize future attempts to extract your information.

    Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

    Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

    Photo by: NordVPN

    Caption by: Eileen Brown

9 of 9 NEXT PREV
Eileen Brown

By Eileen Brown for Social Business | December 21, 2018 -- 19:12 GMT (11:12 PST) | Topic: Security

  • Check the sender’s address
  • Unrecognised sender
  • Valid account but unusual message
  • Spelling and grammar
  • Greeting
  • Promises of money
  • Hover – do not click
  • When in doubt
  • Use VPNs for security

Although hackers are getting more and more sophisticated, you can still recognize that something is not right online. NordVPN shares tips on spotting a phishing message -- and keep your online activities safe.

Read More Read Less

Use VPNs for security

VPNs provide an encrypted tunnel to prevent your credentials being stolen when you are online. a VPN could minimize future attempts to extract your information.

Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

Caption by: Eileen Brown

9 of 9 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Eileen Brown

By Eileen Brown for Social Business | December 21, 2018 -- 19:12 GMT (11:12 PST) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

  • YubiKey 5Ci Clear Limited Edition

    Transparency in security.

  • Certo AntiSpy iPhone Spyware Detection

    Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion. ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums