Cookie Preference Centre

Your Privacy
Strictly Necessary Cookies
Performance Cookies
Functional Cookies
Targeting Cookies

Your Privacy

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, your device or used to make the site work as you expect it to. The information does not usually identify you directly, but it can give you a more personalized web experience. You can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, you should know that blocking some types of cookies may impact your experience on the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site may not work then.

Cookies used

ContactCenterWorld.com

Performance Cookies

These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our site.

Cookies used

Google Analytics

Functional Cookies

These cookies allow the provision of enhance functionality and personalization, such as videos and live chats. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies, then some or all of these functionalities may not function properly.

Cookies used

Twitter

Facebook

LinkedIn

Targeting Cookies

These cookies are set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They work by uniquely identifying your browser and device. If you do not allow these cookies, you will not experience our targeted advertising across different websites.

Cookies used

LinkedIn

This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our products and services, assist with our promotional and marketing efforts, and provide content from third parties

OK

Detecting Phishing Emails Before They Harm Your Call Center Business - Carol Evenson - ContactCenterWorld.com Blog

Detecting Phishing Emails Before They Harm Your Call Center Business

Do you know the signs that indicate someone is trying to scam your employees? Unfortunately, there are many people who don’t, which has resulted in countless attacks and hacks in businesses of all sizes and types. Also, just like the influx of Doritos and Oreo flavors in recent years, the options and types of phishing emails have expanded significantly.

Photo of Person Typing on Computer Keyboard

An email requesting password resets for online banking and social media accounts, fake shipping confirmation, and more are making the rounds. As a result, now is the time to put time and effort to learn about the latest phishing scams like pony malware, ransomware, and more.

 

Here are some of the most common signs that you have been the victim of a phishing email.

 

Look at the Spelling

One of the easiest to spot signs that you have received a phishing email is if there is a spelling mistake in the subject line or in the body of the message. Misspellings are particularly significant if the mail seems to come from a bigger company, such as Facebook or T-Mobile. You can feel confident that these multibillion-dollar companies have the needed resources to ensure everything is spelled properly in their customer-facing communications – even the automated ones.

 

There are some experts who have even made the claim that misspellings are used purposefully to increase the possibility that a less observant individual will fall for the trick.

 

Hover First Then Click

If you see highlighted blue text that indicates a hyperlink in an email you were not expected, this should be an automatic red flag. There are many phishers who may try to hide URLs that lead to malware in this manner. What this means is that you need to hover over the hyperlinks in an email before you actually click them. This will let you see the real destination of the URL, regardless of what the linked text says.

 

If you are using a mobile device, you can use a long press on a suspicious hyperlink to reveal the destination of the linked text, along with several other options.

 

Phishers are also going to try to hide a nefarious URL as a legitimate one by including part of or all of a real brand name. Don’t fall for this – as it’s going to result in serious consequences in most cases.

 

Be Weary of Generic Greetings

Any type of message that is addressed in a generic manner, particularly the ones that relate to any type of financial transaction, is suspicious and should be treated as such. The majority of companies that are dealing with data in any manner have enough information on each of their customers that they can contact them using their real name during email communication. While this may seem a bit creepy to some, personalization is a key way to separate real and fake emails.

 

One of the most common phishing tactics is blasting out a generic email to thousands or even millions of different email addresses, which are often gathered from stolen or compromised databases. All it takes is a single user to click on one of these emails for the cycle to continue.

 

Be Cautious of Attachments

The use of malware-carrying file attachments is still considered a common tactic used by phishers. In fact, according to the 2019 DBIR reports, the top causes f malware delivery during 2018 were attachments. There are some email systems that can block these, but it’s still necessary to know how to spot the problems.

 

Avoiding Dangerous Emails

The fact is that phishing emails are still a serious threat. As a result, you have to ensure that you are taking the proper steps to protect your business. This means proper employee training and ensuring that everyone knows the risk factors that are present is the best way to ensure that you can reduce the likelihood that your business is going to be a victim of one of the millions of attacks that occur each year.

 

 

Publish Date: March 6, 2020 1:58 AM

Submit Event

Upcoming Events

15th annual Best Practice Conference - this is the contact center world's most highly rated event - a whopping 100% of delegates say they would recommend it!

100's of best practice tips and ideas from contact center professionals Read More...
 7
 8809 
Share

Survey - Online Event

Latest Americas Newsletter
both ids empty
session userid =
session UserTempID =
session adminlevel =
session blnTempHelpChatShow =
CMS =
session cookie set = True
session page-view-total =
session page-view-total =
applicaiton blnAwardsClosed =
session blnCompletedAwardInterestPopup =
session blnCheckNewsletterInterestPopup =
session blnCompletedNewsletterInterestPopup =