Share This Checklist
1. Recognize the Signs of a Phishing Scam
Phishing scams often use urgency, deception, and fake credentials to trick victims.
1.1 Look for Suspicious Email Senders and URLs
Scammers often use fake email addresses and deceptive links.
How to do this:
- Always check the sender’s email address carefully—phishers often use addresses that look nearly identical to legitimate ones but may have extra letters or misspellings.
- Hover over links before clicking to see the real destination URL. If it looks unfamiliar or contains odd characters, do not click.
- Be cautious of emails that claim to be from companies like banks, PayPal, or Amazon but come from a generic email provider (e.g., Gmail, Yahoo).
Why it matters:
- Scammers disguise their identities to make fraudulent emails look real.
- Clicking a malicious link can lead to malware installation or stolen login credentials.
1.2 Watch for Spelling and Grammar Errors
Legitimate organizations proofread their emails, while scammers often do not.
How to do this:
- Look for unusual spelling, grammar mistakes, or awkward phrasing in emails or messages.
- Be wary of formal-looking emails that contain obvious typos.
- Scammers often use machine translations or rushed writing, making errors more common.
Why it matters:
- Poor grammar and odd phrasing are red flags that an email is not from a reputable source.
- Legitimate companies rarely send out communications filled with errors.
1.3 Be Wary of Urgent or Threatening Language
Phishing scams rely on fear and urgency to get quick responses.
How to do this:
- If an email or message says your account will be suspended, closed, or locked unless you act immediately, verify directly with the company by contacting them through official channels.
- Be cautious of messages stating you owe money, have won a prize, or must confirm personal information immediately.
- Never trust emails pressuring you to act without verifying the request first.
Why it matters:
- Scammers use urgency to trick people into acting without thinking.
- Legitimate companies will not threaten you over email or text.
2. Protect Yourself from Phishing Attacks
Simple actions can help prevent phishing scams from succeeding.
2.1 Never Click on Links or Download Attachments from Unverified Sources
Malicious links and files can install malware or steal your credentials.
How to do this:
- Instead of clicking links in emails, go directly to the company’s official website by typing the URL into your browser.
- Do not open email attachments unless you are 100% sure they are legitimate.
- If an email asks you to download an invoice, receipt, or important document unexpectedly, confirm with the sender by phone before opening.
Why it matters:
- Malicious links can lead to fake login pages that steal your credentials.
- Attachments can contain malware that infects your device.
2.2 Use Multi-Factor Authentication (MFA) on All Important Accounts
MFA makes it harder for hackers to access your accounts.
How to do this:
- Enable MFA on your email, banking, and social media accounts.
- Use an authenticator app (Google Authenticator, Authy) rather than SMS when possible.
- Never share your one-time codes with anyone—real companies will never ask for them.
Why it matters:
- Even if scammers steal your password, they cannot access your account without your MFA code.
- Adds an extra layer of protection for sensitive accounts.
2.3 Verify Requests for Personal Information
Legitimate companies do not ask for sensitive data via email or text.
How to do this:
- If an email asks for personal details such as your Social Security number, bank information, or passwords, do not respond.
- Contact the company directly using a phone number from their official website, not the number in the email.
- Be cautious of unexpected requests for payment or information, even if they appear to be from a company you know.
Why it matters:
- Phishers pretend to be trusted institutions to steal your data.
- Calling the company yourself ensures you are speaking to the right people.
3. Stay Ahead of Phishing Threats
Being proactive can prevent falling for phishing scams.
3.1 Keep Your Software and Devices Updated
Outdated software can have security vulnerabilities.
How to do this:
- Enable automatic updates for your operating system, web browser, and security software.
- Update your email app and browser extensions regularly.
- Use reputable antivirus and anti-malware software to detect threats.
Why it matters:
- Hackers exploit outdated software to gain access to devices.
- Security patches fix vulnerabilities that phishing scams may try to exploit.
3.2 Use a Password Manager for Strong, Unique Passwords
A password manager keeps your credentials safe and reduces phishing risks.
How to do this:
- Use a password manager to generate strong, unique passwords for every account.
- Avoid reusing passwords across multiple websites.
- Never enter login credentials on an unfamiliar or unverified website.
Why it matters:
- A compromised password on one site should not give hackers access to other accounts.
- Password managers protect against phishing by auto-filling credentials only on real websites.
3.3 Educate Yourself and Others About Phishing Scams
Awareness is the best defense against phishing attacks.
How to do this:
- Learn about new phishing techniques and scams by following trusted cybersecurity sources.
- Share phishing awareness with friends, family, and coworkers to keep them informed.
- If you receive a suspicious message, report it to the company it is impersonating and to organizations like the FTC.
Why it matters:
- Phishing tactics evolve constantly, so staying informed helps you recognize new threats.
- Protecting yourself also helps protect those around you from falling victim.
Final Thoughts
Phishing scams are becoming more sophisticated, but by learning how to recognize warning signs and taking preventive measures, you can protect yourself and your personal information. Always verify unexpected emails, never share sensitive information over email or text, and use strong cybersecurity practices like password managers and multi-factor authentication. Staying vigilant will help keep your data safe and prevent fraud.