Phishing attack

Phishing is a cybercime that has become more common in recent years and therefore certainly requires the necessary attention. In this blog article, we use our expertise as an IT Security company to tell you how you can often recognize phishing.

1. Phishing, what is it?

Phishing attacks are one of the most common security attacks that companies and individuals have to deal with. You may be exposed to phishing in a variety of ways, such as social media, phone calls, messages or emails. Hackers consciously choose these methods because it is the easiest way to penetrate an IT infrastructure via Social Engineering. Within information security this stands for psychologically manipulating recipients (targets) to share personal information with them. In doing so, they pretend to be a legitimate organisation in order to gain trust.

2. How can we recognize a phishing mail?

1. An unusual sender or 2. incorrect mail address

Never received an email from this sender in the past and/or does the mail look suspicious? Then be sure to check the name of the sender, the subject and the email address.

If the organization’s e-mail address ends in “” or “” then you have a good reason to consider this mail to be unreliable. No legitimate organization will send out mailings from a personal mail address.

3. It is too good to be true

Does the offer in the mailing look too good to be true? Chances are this is a phishing mail! We advise you to be careful with this.

4. An action that needs to be done now/quickly

Do you need to perform a certain action quickly so that a certain agreement does not expire? Even then, you are most likely dealing with a phishing mail. Legitimate organisations announce these things in advance. In both cases it is best to ignore the email or when in doubt you can go to the original website to see if you can find additional information about it.

5. Suspicious links

Make sure the link matches the content in the email. In many cases hackers place the link behind a button so that it is not immediately noticeable. Therefore, teach yourself to always check a link before clicking on it.

How to do this:

Computer: Hover over the link and check in the bar at the bottom of your screen.
GSM: Hold the link and check the link in the pop-up.

Of course, there are other possible ways to use Phishing and new, innovative techniques are being used more and more often. As an IT Security company, we try to stay up to date with new trends and make sure to inform our customers about them.

Would you like to test your employees’ knowledge of Phishing attacks? Then please contact us! Our experts will take care of an elaborated phishing campaign with the aim of recognizing phishing attacks and becoming aware of the possible dangers.