{"id":2959,"date":"2021-07-17T16:42:33","date_gmt":"2021-07-17T13:42:33","guid":{"rendered":"https:\/\/mailsafi.com\/blog\/?p=2959"},"modified":"2021-07-19T13:46:42","modified_gmt":"2021-07-19T10:46:42","slug":"signs-of-a-phishing-scam-email","status":"publish","type":"post","link":"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/","title":{"rendered":"How to Recognize Signs of a Phishing Scam Email"},"content":{"rendered":"\n<p>Phishing scam emails cotninue to be a leading attack vector in across the globe, and it is important that your entire staff recognizes the signs of a phishing email. Companies of all sizes are targets for frequent, extremely sophisticated phishing scam attacks, and it is unrealistic to expect IT and security teams to identify all phishing attacks and fight that battle alone using only technology.<\/p>\n\n\n\n<p>While email filtering solutions can significantly minimize the risk of phishing and scam emails getting to your mailbox, sometimes, a few sophisticated ones can still make their way through.<\/p>\n\n\n\n<p>In this article, we will discuss:<\/p>\n\n\n\n<ul><li>Why scammers send you phishing emails<\/li><li>Why phishing awareness is important to businesses<\/li><li>13 typical signs of a phishing email \u2013 learn the tell-tale signs of a fake or scam email, including examples.<\/li><li>What more you can do if you identify a phishing email.<\/li><\/ul>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_49 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"ez-toc-toggle-icon-1\"><label for=\"item-69e21e00e54d6\" aria-label=\"Table of Content\"><span style=\"display: flex;align-items: center;width: 35px;height: 30px;justify-content: center;direction:ltr;\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/label><input  type=\"checkbox\" id=\"item-69e21e00e54d6\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#1_Why_Scammers_Send_You_Phishing_Emails\" title=\"1. Why Scammers Send You Phishing Emails\">1. Why Scammers Send You Phishing Emails<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#2_Why_Phishing_Scam_Awareness_is_Important_to_Businesses\" title=\"2.&nbsp;&nbsp; Why Phishing Scam Awareness is Important to Businesses\">2.&nbsp;&nbsp; Why Phishing Scam Awareness is Important to Businesses<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#3_The_Difference_Between_Spam_and_a_Phishing_Scam_Email\" title=\"3. The Difference Between Spam and a Phishing Scam Email\">3. The Difference Between Spam and a Phishing Scam Email<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#4_13_Typical_Signs_of_a_Phishing_Scam_Email\" title=\"4. 13 Typical Signs of a Phishing Scam Email\">4. 13 Typical Signs of a Phishing Scam Email<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#i_Spelling_Grammatical_and_Punctuation_Errors\" title=\"i. Spelling, Grammatical and Punctuation Errors\">i. Spelling, Grammatical and Punctuation Errors<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#ii_Links_in_the_body_of_the_email_that_redirect_to_unexpected_sites\" title=\"ii. Links in the body of the email that redirect to unexpected sites\">ii. Links in the body of the email that redirect to unexpected sites<\/a><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#Another_URL_Inspection_Tip\" title=\"Another URL Inspection Tip\">Another URL Inspection Tip<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#iii_Threats_or_a_Sense_of_Urgency\" title=\"iii. Threats or a Sense of Urgency\">iii. Threats or a Sense of Urgency<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#iv_Request_for_Credentials_Payment_Information_or_Other_Personal_Details\" title=\"iv. Request for Credentials, Payment Information or Other Personal Details\">iv. Request for Credentials, Payment Information or Other Personal Details<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#v_Suspicious_Attachments\" title=\"v. Suspicious Attachments\">v. Suspicious Attachments<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#vi_An_Unusual_Tone_or_Greeting\" title=\"vi. An Unusual Tone or Greeting\">vi. An Unusual Tone or Greeting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#vii_Unusual_Request\" title=\"vii. Unusual Request\">vii. Unusual Request<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#viii_Pushy_or_Suspicious_Language\" title=\"viii.&nbsp;Pushy or Suspicious Language\">viii.&nbsp;Pushy or Suspicious Language<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#ix_You_Did_Not_Initiate_the_Conversation\" title=\"ix. You Did Not Initiate the Conversation\">ix. You Did Not Initiate the Conversation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#x_Uncommon_Uses_of_the_Email_Bcc_Field\" title=\"x. Uncommon Uses of the Email Bcc Field\">x. Uncommon Uses of the Email Bcc Field<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#xi_Inspect_the_Email_Header_Info_to_Verify_Whether_the_Sender%E2%80%99s_Email_Address_is_Legit\" title=\"xi.&nbsp;Inspect the Email Header Info to Verify Whether the Sender\u2019s Email Address is Legit\">xi.&nbsp;Inspect the Email Header Info to Verify Whether the Sender\u2019s Email Address is Legit<\/a><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#Carefully_scan_email_headers_for_deceptive_domains_and_spelling_differences_in_email_addresses\" title=\"Carefully scan email headers for deceptive domains and spelling differences in email addresses.\">Carefully scan email headers for deceptive domains and spelling differences in email addresses.<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#xii_Short_and_Sweet\" title=\"xii. Short and Sweet\">xii. Short and Sweet<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#xiii_Be_Vigilant_%E2%80%93_Even_If_the_Email_is_From_a_Known_Email_Address\" title=\"xiii. Be Vigilant &#8211; Even If the Email is From a Known Email Address\">xiii. Be Vigilant &#8211; Even If the Email is From a Known Email Address<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#5_What_to_Do_If_You_Identify_a_Phishing_Scam_Email\" title=\"5.&nbsp;&nbsp; What to Do If You Identify a Phishing Scam Email\">5.&nbsp;&nbsp; What to Do If You Identify a Phishing Scam Email<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#In_Conclusion%E2%80%A6\" title=\"In Conclusion\u2026\">In Conclusion\u2026<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:28px\"><span class=\"ez-toc-section\" id=\"1_Why_Scammers_Send_You_Phishing_Emails\"><\/span>1. <strong>Why Scammers Send You Phishing Emails<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"626\" height=\"530\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/phishing-attack-cyber-attacker.jpg\" alt=\"\" class=\"wp-image-2964\" srcset=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/phishing-attack-cyber-attacker.jpg 626w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/phishing-attack-cyber-attacker-300x254.jpg 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><figcaption>Phishing scam attack<\/figcaption><\/figure><\/div>\n\n\n\n<p>Phishing emails are sent to:<\/p>\n\n\n\n<ul><li>Create a sense of urgency to get you to engage with the scammers in order to defraud your company or get other sensitive information from you.<\/li><li>Deliver malware to your computer via attachments or links.<\/li><li>Redirect you to a malicious website \u2013 often, a replica of a legitimate company\u2019s website.<\/li><li>Trick you into sharing your login credentials, financial information, or other confidential information in a bid to defraud you or your company.<\/li><\/ul>\n\n\n\n<p>Now that we know why scammers send phishing emails, let\u2019s understand why phishing awareness is important for any business.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:28px\"><span class=\"ez-toc-section\" id=\"2_Why_Phishing_Scam_Awareness_is_Important_to_Businesses\"><\/span><strong>2.&nbsp;&nbsp; Why Phishing Scam Awareness is Important to Businesses<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-pullquote is-style-default\"><blockquote><p><strong><em>Successful phishing attacks&nbsp;give attackers a foothold in corporate networks.<\/em><\/strong><\/p><\/blockquote><\/figure>\n\n\n\n<p>There are <a href=\"https:\/\/mailsafi.com\/blog\/understanding-phishing-and-the-6-types-of-phishing-emails\/\">many types of phishing attacks<\/a>, but in a nutshell, phishing is any type of attack by email that is designed to trick the recipient into taking a specific course of action such as clicking a link that leads to a compromised website, opening a malware-laden attachment or divulging confidential information such as intellectual property, usernames and passwords, credit card information, and so on.<\/p>\n\n\n\n<p>While <a href=\"https:\/\/www.mailsafi.com\/email-security\">a good spam filtering solution<\/a> is vital armor in the war against scam emails, on their own, email filters are not 100% effective, and consequently, not sufficient protection from all scams.<\/p>\n\n\n\n<p>Because you (human) are the target of phishing scam emails, you must also play a role in the war against cyber criminals who are trying to compromise your company systems and data. To help in the fight against spam, you must learn how to recognize the signs of an email phishing scam to prevent yourself from becoming a victim.&nbsp;<\/p>\n\n\n\n<p>Below are some tell-tale signs which, if spotted by the recipient, can prevent a scam phishing attack from being successful. <strong>But first, it is important to know the difference between a phishing scam email and a spam email.<\/strong><\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:28px\"><span class=\"ez-toc-section\" id=\"3_The_Difference_Between_Spam_and_a_Phishing_Scam_Email\"><\/span><strong>3. The Difference Between Spam and a Phishing Scam Email<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"592\" height=\"213\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/phishing-vs-spam.jpg\" alt=\"\" class=\"wp-image-2965\" srcset=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/phishing-vs-spam.jpg 592w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/phishing-vs-spam-300x108.jpg 300w\" sizes=\"(max-width: 592px) 100vw, 592px\" \/><figcaption>Phishing scam vs spam<\/figcaption><\/figure><\/div>\n\n\n\n<p>A spam email is relatively harmless. While it may be unsolicited and come from an unknown email address or look generally unusual, these types of emails usually are trying to sell you on something. For example, a spam email could aim to entice you into subscribing to something, purchasing an item or read an unsolicited newsletter.&nbsp;<\/p>\n\n\n\n<p>In contrast,&nbsp;<strong>phishing emails are designed to be dangerous <\/strong>as described in section 1 above. Below are common signs that can help you recognize that an email is not as genuine as it appears to be and is potentially a phishing or scam email.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:28px\"><span class=\"ez-toc-section\" id=\"4_13_Typical_Signs_of_a_Phishing_Scam_Email\"><\/span><strong>4. 13 Typical Signs of a Phishing Scam Email<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Although an email similar to those described here will not <em>always<\/em> be a phishing email, you should instinctively be on high alert when you notice any of the following signs.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"i_Spelling_Grammatical_and_Punctuation_Errors\"><\/span><strong>i. Spelling, Grammatical and Punctuation Errors<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>One of the more typical signs of a scam email is spelling and grammatical errors. Most reputable companies follow strict email etiquette and editorial standards. While some typing errors may happen occasionally, it\u2019s uncommon to see several glaring errors in a single email. Therefore, if you see multiple errors, this is a red flag you should not ignore. See the example below.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"> <strong>Re: Thank you for your purchase<\/strong>\n Dear Customer,\n Your Apple ID has just been used to buy Race Game from the App Store from <span class=\"has-inline-color has-luminous-vivid-orange-color\">unknwn <\/span>device\n Date: Tuesday 10 July 2019\n Browser: <span class=\"has-inline-color has-luminous-vivid-orange-color\">Chrom<\/span>\n Operate system: 12.1\n If you did not <span class=\"has-inline-color has-luminous-vivid-orange-color\">authoriz purchase.&nbsp;&nbsp; please<\/span> fill attached form before 11 July 2019 to cancel order<\/pre>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"ii_Links_in_the_body_of_the_email_that_redirect_to_unexpected_sites\"><\/span><span class=\"has-inline-color has-vivid-red-color\">ii. Links in the body of the email that redirect to unexpected sites<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>If a link in the body of an email takes you to a site different from that written on the link, this is a red flag. Scammers can include text that looks like it will take you to a genuine website. However, the actual hyperlinks they embed on this text take you to a phishing or malicious site instead.<\/p>\n\n\n\n<p><em>Example<\/em>: You get an email that looks like it\u2019s coming from PayPal. It\u2019s warning you about an unauthorized login attempt and asking you to change the password to protect your account. There is a link given to change your password:&nbsp;<em><u>https:\/\/www.paypal.com\/account\/passwordChange<\/u><\/em>. You think it\u2019s safe as the link looks legit. However, when you click on it, you\u2019ll be redirected to some scam website that appears legitimate because they use PayPal\u2019s site design, colors, fonts, and logo. Here, the fake website will try to trick you into typing your login credentials or divulge other confidential information. <\/p>\n\n\n\n<p>To be safe, you can either:<\/p>\n\n\n\n<ul><li>Compare with previous emails received from the sender that the sender&#8217;s email addresses match, or,<\/li><li>For a link embedded in the email, hover your cursor over it to verify what \u2018pops up\u2019. If the email is allegedly from Amazon, but the link domain does not include \u201camazon.com,\u201d that\u2019s a huge red flag. <strong><u>If the domain names don\u2019t match, don\u2019t click<\/u><\/strong>.<\/li><\/ul>\n\n\n\n<p>Some links lead users to a malware-laden website that auto-downloads malware onto your device without your knowledge. Sometimes, malicious redirects are also concealed in the <em>Unsubscribe<\/em> button.<\/p>\n\n\n\n<p><strong>To confirm i<\/strong>f <strong>a link is safe without clicking on it, hover your cursor over it to display the real URL.<\/strong>&nbsp;If the text in the pop-up URL differs from what displays in the linked text (as in the example below), it\u2019s likely a malicious link so <strong><u>do not click on it<\/u><\/strong>!<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"838\" height=\"236\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/sample-scam-email-1.png\" alt=\"\" class=\"wp-image-2961\" srcset=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/sample-scam-email-1.png 838w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/sample-scam-email-1-300x84.png 300w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/sample-scam-email-1-768x216.png 768w\" sizes=\"(max-width: 838px) 100vw, 838px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\" style=\"font-size:22px\"><span class=\"ez-toc-section\" id=\"Another_URL_Inspection_Tip\"><\/span><strong><u>Another URL Inspection Tip<\/u><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>If any of the links in your message uses a URL shortened (links that start with tinyurl, bit.ly, goo.gl, is.gd, t.co, etc.), you can see the expanded URL by using this website: getlinkinfo.com<\/p>\n\n\n\n<p>In the past, people would shorten URLs to make links consume less space and look more professional. Unfortunately, nowadays, scammers are also using URL-shorting tools to conceal their original malicious links.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"iii_Threats_or_a_Sense_of_Urgency\"><\/span><span class=\"has-inline-color has-vivid-red-color\"><strong>iii. Threats or a Sense of Urgenc<\/strong>y<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Scammers like to create a sense of urgency by imposing time limits to urge or even demand immediate action from you. <em>Always<\/em> treat emails that threaten negative consequences for failing to do <em>xyz<\/em> with skepticism. The scammer hopes that by reading the email in haste, you will not scrutinize the content of the email thoroughly. Reading in haste means you are likely to overlook other inconsistencies associated with phishing campaigns.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>Re: Account Verification Required!<\/strong>\n\n<strong>From<\/strong>: MailSafi <a href=\"mailto:support@mailsafii.com\">&lt;support@mailsafii.com<\/a>&gt;\n\nDear Valued Customer,\n\nWe recently have traced various computers attempting to log into your email account with multiple password failures. For your security, we need you to confirm your account details by <strong>6 July 2020<\/strong>. If this is not done, we will be forced to lock your account for security reasons. \n\nTo confirm your account, <span style=\"text-decoration: underline;\">click here<\/span>.\n\nRegards,\nSupport <\/pre>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"iv_Request_for_Credentials_Payment_Information_or_Other_Personal_Details\"><\/span><strong>iv. Request for Credentials, Payment Information or Other Personal Details<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Beware of any email asking you to update your account information and providing a link to do so. This may be a phishing email. One of the more sophisticated phishing emails is when an attacker creates a fake landing page that recipients are directed to by a link in an official-looking email. The fake landing page will have a login box for you to type in your credentials or other confidential information. Sometimes, these emails and fake landing pages may even have the logo and other identifying information of a business you know. However, if you click on the link (<strong>Don\u2019t!<\/strong>), it will lead you to a dummy site designed to steal your credentials and\/or other confidential information.<\/p>\n\n\n\n<p>If the email was unexpected, visit the website from which the email has supposedly come by <strong><u>typing in the URL \u2013 rather than clicking on any link in the body of the email<\/u><\/strong> \u2013 to avoid typing in your login credentials on the fake site or making a payment to the attacker.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"v_Suspicious_Attachments\"><\/span><strong><span class=\"has-inline-color has-vivid-red-color\">v. Suspicious Attachments<\/span><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>A good rule of thumb when it comes to email attachments is to ask yourself: \u201c<em>Did I request for this information?\u201d<\/em><\/p>\n\n\n\n<p>If you receive an email with an attachment from an unknown source or if you did not request or expect to receive a file from the sender of the email, be cautious as cybercriminals will often send emails with attachments to trick you into downloading their malicious executables. These attachments could come in many forms, including:<\/p>\n\n\n\n<ul><li>Request for quotation<\/li><li>Receipts for payment<\/li><li>Photos or other graphics<\/li><li>Pricing sheets<\/li><li>Invoice documents<\/li><\/ul>\n\n\n\n<p>If you receive an email with a .zip, .exe, .scr, or other unfamiliar extension, flag the file to be virus-and-malware scanned before clicking on it to open. Others still appear as simple spreadsheets, Word, or PDF documents.<\/p>\n\n\n\n<p>Since Microsoft and Adobe added the ability for Word documents and PDFs to work like executables via scripting and macros, document-based malware sent over emails have become increasingly common. Unfortunately, once downloaded, some of these malwares have the ability to spread to other documents in the system. Should this happen, other legitimate documents sent from the same workstation can spread the virus further within the network, to clients, and other business associates. If sent externally, it has the potential of getting your domain blacklisted on for sending emails with malicious content.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>Re<\/strong>: February Invoice #09808\n\n<strong>Attachment<\/strong>: Internet bill - invoice09808.doc\n\nAttached is invoice for Feb. Please make payment before 12 February 2018 to avoid disconnection.\n\nThanks <\/pre>\n\n\n\n<p><\/p>\n\n\n\n<p>If in doubt about whether an email or attachment is legitimate, contact the sender directly \u2013 preferably on phone using contact sources you trust such as the company\u2019s website or one you already had stored before. <strong><u>Never use the contact information that\u2019s listed in an email that is questionable!<\/u><\/strong><\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"vi_An_Unusual_Tone_or_Greeting\"><\/span><strong>vi. An Unusual Tone or Greeting<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The first thing that should arouse your suspicion when reading a phishing email is if the language seems odd, unusual, or unfamiliar. For instance, a colleague is suddenly over-familiar or a little more formal than they ordinarily are.<\/p>\n\n\n\n<p>For example, if I were to receive an email from MailSafi\u2019s CTO that began with \u201c<em>Dear Joy<\/em>,\u201d that would immediately raise a red flag. In all of our communication, he has never begun an email with that greeting so it would feel unusual. If a message appears strange, it\u2019s worth scrutinizing it in more detail for other signs that it may be a phishing scam email.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"vii_Unusual_Request\"><\/span><strong>vii. Unusual Request<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>If an email asks you to do something that is out of the norm, then that too is a red flag. For instance, if an email claims to be from the ICT department and asks you to install a certain program or contains a link for you to click in order to upgrade or patch your system, yet ordinarily, this type of activity is managed by the ICT department, that should be a big indicator that you are most likely reading a phishing email and you should not to follow the instructions.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"viii_Pushy_or_Suspicious_Language\"><\/span><strong>viii.&nbsp;Pushy or Suspicious Language<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>There are many subjects that elicit emotional responses from email recipients. Hackers know this and will use email subjects that will spur you to take action you ordinarily wouldn\u2019t, without stopping to inspect or investigate the emails properly. Scammers will try to trigger emotional responses like anger, shock, empathy, panic, curiosity, etc. Here are some example subject lines of such emails:<\/p>\n\n\n\n<ul><li>COVID-19 fundraising campaign for Slum Dwellers<\/li><li>An unbelievable deal!<\/li><li>You won!<\/li><li>Sales job vacancy<\/li><li>Unauthorized access to your account<\/li><li>Your purchase on Amazon is complete<\/li><\/ul>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"ix_You_Did_Not_Initiate_the_Conversation\"><\/span><strong>ix. You Did Not Initiate the Conversation<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Because scam emails are unsolicited, an often used tactic is to inform you that you have won a prize, will qualify for a prize if you reply to the email, or you will get a discount or discount code by clicking on a link or opening a certain attachment.<\/p>\n\n\n\n<p>In cases where you did not initiate the conversation, e.g., by opting in to receive marketing material or newsletters, etc., there is a high likelihood that the email is malicious.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"x_Uncommon_Uses_of_the_Email_Bcc_Field\"><\/span><strong>x. Uncommon Uses of the Email Bcc Field<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In some emails, you will see your email address listed in the Bcc field instead of the recipient field. While there\u2019s technically nothing wrong with this, it is uncommon for organizations to use the Bcc field when communicating with customers. No genuine company will send a blind carbon copy email asking you to verify your account information or to requesting you to download transaction receipts. They will reach out to you directly.<\/p>\n\n\n\n<p>So, if you see your email address in the Bcc field instead of in front of \u201c<strong>To:<\/strong>\u201d or \u201c<strong>Send To:<\/strong>\u201d it\u2019s a good indicator that the email is a fake.<\/p>\n\n\n\n<p>Let\u2019s consider the example phishing email in the screenshot below. Check out how the sender lists my email address in the Bcc column instead of the recipient (<strong>To:<\/strong>) field. Also, see how smart the sender is by including \u201c@amazon.com\u201d as part of the sender\u2019s display email address to deceive the recipient.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"> Re: Amazon Billing Info #278797 \u2013 Action Required \u2013 Waiting verification\n <strong>From<\/strong>: billing-alert@amazon.com &lt;mammoth@gmail.com&gt;\n <strong>To<\/strong>: billing-alert@amazon.com \n <strong>Bcc<\/strong>: jill@asdesk.com\n \n<strong>Account ID: #9089A879<\/strong>\n\nThis is a system generated email. Please do not reply, thanks.\n\nClick to view your <span style=\"text-decoration: underline;\">statement.pdf<\/span><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"xi_Inspect_the_Email_Header_Info_to_Verify_Whether_the_Sender%E2%80%99s_Email_Address_is_Legit\"><\/span><strong>xi.&nbsp;Inspect the Email Header Info to Verify Whether the Sender\u2019s Email Address is Legit<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Genuine organizations <em>typically<\/em> send emails from email addresses containing the company\u2019s domain name after the \u201c@\u201d symbol. For example,&nbsp;<em>xyz<\/em><strong>@absa.com<\/strong>,&nbsp;<em>xyz<\/em><strong>@amazon.com<\/strong>, abc@<strong>jpmorgan.com<\/strong>, etc. The company\u2019s domain is what comes after the \u201c@\u201d sign. To get such an email address, you must own the domain name. Alternatively, an authorized person from the company must create one for you.<\/p>\n\n\n\n<p>If you get an email claiming to be from a well-known organization, here\u2019s how you can easily tell if the email is not genuine:<\/p>\n\n\n\n<ul><li>The sender\u2019s email is coming from a free domain email addresses such as Gmail, Hotmail, Yahoo, AOL, etc. <strong>Related articl<\/strong>e: <a href=\"https:\/\/www.mailsafi.com\/6-reasons-not-to-use-free-web-based-email-for-your-business\">6 reasons not to use free web-based email for your business<\/a><\/li><li>The email is sent from an unknown domain name.<\/li><li>The sender\u2019s name and the name in the email address don\u2019t match.<\/li><\/ul>\n\n\n\n<p>For example, if the sender claims that email is from ABSA, the sender\u2019s email address must have @absa.com in it. If the sender\u2019s email address ends with \u201c@gmail.com\u201d or some unusual domain name after @, this is a glaring red flag.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"> Wednesday, 15 Jan, 2017 10:45:16 AM\n &nbsp;\n <strong>Subject: Notification: Inbox Space Running Out<\/strong>\n &nbsp;\n From: Administrator <a href=\"mailto:absabank@gmail.com\">&lt;absabank@gmail.com<\/a>&gt;\n To: Peter Simba <a href=\"mailto:peter.simba@kachooks.com\">&lt;peter.simba@kachooks.com<\/a>&gt;\n &nbsp;\n Kachooks.com Administrator\n &nbsp;\n Your mailbox is almost 100% full. Once you reach the limit, no more emails will be delivered to your mailbox.\n &nbsp;\n <span style=\"text-decoration: underline;\">Login here<\/span> to request for additional space.  <\/pre>\n\n\n\n<p><\/p>\n\n\n\n<p>From the illustration above, a legit email would likely be coming from @absa.com not from a Gmail account.<\/p>\n\n\n\n<p>Below is another example of a phishing scam email. Here, the cybercriminal impersonates one of your HR staff, William Paul. However, the email address is not correct \u2013 typically, unrelated to the company in question.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">Tuesday, 15 Jan, 2018 11:17:18 AM\n &nbsp;\n<strong>Subject: Request for payroll and bills authorization<\/strong>\n &nbsp;\nFrom: William Paul &lt;<a href=\"mailto:william@redhills.com\">william@redhills.com<\/a>&gt;\nTo: Kate Williams \n &nbsp;\nKindly log in here to review and approve this month\u2019s payroll and bills. I will appreciate your quick response to avoid delaying payments\n &nbsp;\nKind regards,\nWilliam <\/pre>\n\n\n\n<p><\/p>\n\n\n\n<p>Cybercriminals hope that the recipient will see the name (William Paul in this example) and forget to double-check the email address <a href=\"mailto:william@redhills.com\">william@redhills.com<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\" style=\"font-size:18px\"><span class=\"ez-toc-section\" id=\"Carefully_scan_email_headers_for_deceptive_domains_and_spelling_differences_in_email_addresses\"><\/span><strong>Carefully scan email headers for deceptive domains and spelling differences in email addresses<\/strong>.<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Sophisticated attackers are smart enough to not use a generic free email address. Instead, they purchase domain names that look similar to the genuine company\u2019s domain that they wish to masquerade as.<\/p>\n\n\n\n<p>Below are some examples of how scammers may use deceptive (look-a-like) domains names:<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>The trick<\/strong><\/td><td><strong>Original Domain<\/strong><\/td><td><strong>Deceptive (look-a-like)domain<\/strong><\/td><\/tr><tr><td><strong>Replace \u201cS\u201d with \u201c5<\/strong>\u201c<\/td><td>absa.com<\/td><td>ab5a.com<\/td><\/tr><tr><td><strong>Replace \u201cm\u201d with \u201crn<\/strong>\u201c<\/td><td>safaricom.com<\/td><td>safaricorn.com<\/td><\/tr><tr><td><strong>Replace \u201cL\u201d with \u201c1\u201d<\/strong><\/td><td>wallmart.com<\/td><td>wal1mart.com<\/td><\/tr><tr><td><strong>Replace \u201cO\u201d with \u201c0\u201d<\/strong><\/td><td>carrefour.com<\/td><td>carref0ur.com<\/td><\/tr><tr><td><strong>Add extra letters, words or symbols<\/strong><\/td><td>amazon.com ebay.com mtn.com<\/td><td>amazon-online.com ebaysupport.com mttn.com<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Some of these subtle differences to the domain names may be difficult to recognize. Therefore, it is important that you always scrutinize the sender\u2019s email address with extra caution.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"xii_Short_and_Sweet\"><\/span><strong>xii. Short and Sweet<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>While many phishing emails will be packaged with details designed to offer false security, some are also scanty in information, hoping to cash in on their ambiguity. For instance, a scammer that spoofs an email from Philip at an organization that is a regular supplier emailing the company once or twice weekly, may have the vague message, \u201c<em>Please find attached as earlier requested<\/em>\u201d and an attachment titled \u2018<em>Additional information\u2019<\/em> in hopes they\u2019ll get lucky.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:24px\"><span class=\"ez-toc-section\" id=\"xiii_Be_Vigilant_%E2%80%93_Even_If_the_Email_is_From_a_Known_Email_Address\"><\/span><strong>xiii. Be Vigilant &#8211; Even If the Email is From a Known Email Address<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>You may receive an unsolicited or unexpected email from a known email address. It may be from a colleague, relative or friend, but it may look or feel \u201coff\u201d. There\u2019s no specific science to define what \u201coff\u201d means, just use your instincts. For example, the email may ask you to:<\/p>\n\n\n\n<ul><li>Urgently transfer money to help them as they are stuck.<\/li><li>Follow a certain link to a website to get an unbelievable (unrealistic) deal.<\/li><li>Donate money to some unknown charity.<\/li><li>Reply with your phone number, some files or personal information such as banking info.<\/li><li>Download a software, attachment, or a media file.<\/li><\/ul>\n\n\n\n<p>If you get such an email, this is another time when you should reach out to the sender personally (even if the email is from a legit email address) via phone before taking any actions suggested in the email. Your loved one\u2019s email account might be compromised, and they have no clue about it!<\/p>\n\n\n\n<p>Clicking on links or attachments in such emails could cause you to download <a href=\"https:\/\/www.mailsafi.com\/glossary\/malware\">malware<\/a> you\u2019re your device or computer. Some malware is designed to corrupt a users\u2019 devices and send phishing emails on their behalf to other victims. These types of malware delete the emails from the sent folder, and the victims remain unaware of such compromise.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:28px\"><span class=\"ez-toc-section\" id=\"5_What_to_Do_If_You_Identify_a_Phishing_Scam_Email\"><\/span><strong>5.&nbsp;&nbsp; What to Do If You Identify a Phishing Scam Email<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Recognizing a phishing or scam email is a great first step in aiding your business fight scam. When you do identify a phishing email, ignoring such fake emails isn\u2019t enough. You should also:<\/p>\n\n\n\n<ol type=\"1\"><li><strong>Block the sender<\/strong> using settings in your email client or mailbox. You can do this by clicking on options for \u201cBlock sender\u201d or \u201cReport as spam\u201d. If you don\u2019t want to open the email, you can right-click on it in your inbox. In the drop-down menu in Gmail, for example, go to&nbsp;<strong>Move To<\/strong>&nbsp;and click on&nbsp;<strong>Spam.<\/strong><\/li><li><strong>Delete phishing emails<\/strong> to avoid accidentally clicking on them in future.<\/li><li><strong>Call sender to confirm. <\/strong>If in doubt whether an email you have received is a phishing email, call the sender (if it claims to be from someone or a company you know) and verify first.<\/li><li><strong>Report<\/strong> the phishing email to your incident response team. As the old adage goes, \u201c<em>See something, say something.<\/em>\u201d In any organization, if you are receiving a phishing email, chances are that others are as well. If you receive a phishing email from someone impersonating a company you know, forward the email to that company\u2019s official customer support to let them know.<\/li><\/ol>\n\n\n\n<p>It becomes the responsibility of your incident response team to scrutinize these reports to ascertain there are no false positives. Because these alerts may be many, the incident response team needs to prioritize alerts received from users who have a history of accurately flagging phishing attacks. These employee-sourced, prioritized reports provide the incident response team with information to mitigate the risk of phishing threats that have not been captured by email filtering systems.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:28px\"><span class=\"ez-toc-section\" id=\"In_Conclusion%E2%80%A6\"><\/span><strong>In Conclusion\u2026<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If you&#8217;re a company or business, all it takes is one user falling pretty to a phishing attempt to compromise your entire network.&nbsp;<strong>It is therefore important to promote phishing awareness and condition employees to report signs of a phishing email to your internal incident report teams. Companies need to regularly educate <u>all<\/u> staff on cyber security best practices because your security is only as strong as your weakest link.<\/strong> Teach employees how to recognize and avoid phishing scams, create strong passwords, and avoid common cyber threats online. Educating your staff about cyber security risks and best practices empowers them and builds a culture of personal accountability within an organization in the fight against spam.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/www.mailsafi.com\/contact-us\">Get in touch with us<\/a> to discuss how we can help your organization in this regard through our <a href=\"https:\/\/www.mailsafi.com\/cyber-security-training\">cyber security training<\/a><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\">Although no email filtering solution can be 100% effective, any business email system without an email filtering solution is highly vulnerable, if not unusable. It is important to use technology to stop as much spam, viruses, malware, phishing attacks and other advanced email threats as you can to protect your network from the many possible risks. In this way, you will offer your users, network and business an additional layer of protection.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\">If you don\u2019t already have an <a href=\"https:\/\/www.mailsafi.com\/email-filtering-service-for-businesses\">email filtering solution<\/a> in place as a first line of defence, sign up today for <a href=\"https:\/\/www.mailsafi.com\/email-security\">MailSafi Email Security<\/a> and watch the volume of spam and phishing emails coming to your mailbox decrease drastically!<\/p>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_2959\" class=\"pvc_stats all  \" data-element-id=\"2959\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Phishing scam emails cotninue to be a leading attack vector in across the globe, and it is important that your entire staff recognizes the signs of a phishing email. Companies of all sizes are targets for frequent, extremely sophisticated phishing scam attacks, and it is unrealistic to expect IT and security teams to identify all [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_2959\" class=\"pvc_stats all  \" data-element-id=\"2959\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":2962,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3,175],"tags":[198,112,23,44,169,252,266],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Phishing Scam Email Signs You Must Know | MailSafi 2021<\/title>\n<meta name=\"description\" content=\"On their own, email filters are not enough to fight spam. You must learn how to recognize phishing scam emails to prevent yourself from becoming a victim. Here are 13 ways to get you started.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing Scam Email Signs You Must Know | MailSafi 2021\" \/>\n<meta property=\"og:description\" content=\"On their own, email filters are not enough to fight spam. You must learn how to recognize phishing scam emails to prevent yourself from becoming a victim. Here are 13 ways to get you started.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/\" \/>\n<meta property=\"og:site_name\" content=\"The MailSafi Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/msgafricaltd\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-17T13:42:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-19T10:46:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/Dont-get-scammed.png\" \/>\n\t<meta property=\"og:image:width\" content=\"873\" \/>\n\t<meta property=\"og:image:height\" content=\"328\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"the_leaders\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:site\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"the_leaders\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/\"},\"author\":{\"name\":\"the_leaders\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\"},\"headline\":\"How to Recognize Signs of a Phishing Scam Email\",\"datePublished\":\"2021-07-17T13:42:33+00:00\",\"dateModified\":\"2021-07-19T10:46:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/\"},\"wordCount\":3452,\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/Dont-get-scammed.png\",\"keywords\":[\"business email security\",\"cybersecurity awareness\",\"email security\",\"phishing attacks\",\"phishing emails\",\"phishing scams\",\"scam email\"],\"articleSection\":[\"Email Security\",\"Resources\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/\",\"url\":\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/\",\"name\":\"Phishing Scam Email Signs You Must Know | MailSafi 2021\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/Dont-get-scammed.png\",\"datePublished\":\"2021-07-17T13:42:33+00:00\",\"dateModified\":\"2021-07-19T10:46:42+00:00\",\"description\":\"On their own, email filters are not enough to fight spam. You must learn how to recognize phishing scam emails to prevent yourself from becoming a victim. Here are 13 ways to get you started.\",\"breadcrumb\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#primaryimage\",\"url\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/Dont-get-scammed.png\",\"contentUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/Dont-get-scammed.png\",\"width\":873,\"height\":328,\"caption\":\"Business email - don't get scammed\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mailsafi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Recognize Signs of a Phishing Scam Email\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"name\":\"The MailSafi Blog\",\"description\":\"We Stop Spam\",\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mailsafi.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\",\"name\":\"Message Labs Africa\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Message Labs Africa\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/msgafricaltd\/\",\"https:\/\/x.com\/msgafricaltd\",\"https:\/\/www.linkedin.com\/feed\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\",\"name\":\"the_leaders\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"caption\":\"the_leaders\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing Scam Email Signs You Must Know | MailSafi 2021","description":"On their own, email filters are not enough to fight spam. You must learn how to recognize phishing scam emails to prevent yourself from becoming a victim. Here are 13 ways to get you started.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/","og_locale":"en_US","og_type":"article","og_title":"Phishing Scam Email Signs You Must Know | MailSafi 2021","og_description":"On their own, email filters are not enough to fight spam. You must learn how to recognize phishing scam emails to prevent yourself from becoming a victim. Here are 13 ways to get you started.","og_url":"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/","og_site_name":"The MailSafi Blog","article_publisher":"https:\/\/www.facebook.com\/msgafricaltd\/","article_published_time":"2021-07-17T13:42:33+00:00","article_modified_time":"2021-07-19T10:46:42+00:00","og_image":[{"width":873,"height":328,"url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/Dont-get-scammed.png","type":"image\/png"}],"author":"the_leaders","twitter_card":"summary_large_image","twitter_creator":"@msgafricaltd","twitter_site":"@msgafricaltd","twitter_misc":{"Written by":"the_leaders","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#article","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/"},"author":{"name":"the_leaders","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14"},"headline":"How to Recognize Signs of a Phishing Scam Email","datePublished":"2021-07-17T13:42:33+00:00","dateModified":"2021-07-19T10:46:42+00:00","mainEntityOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/"},"wordCount":3452,"publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/Dont-get-scammed.png","keywords":["business email security","cybersecurity awareness","email security","phishing attacks","phishing emails","phishing scams","scam email"],"articleSection":["Email Security","Resources"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/","url":"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/","name":"Phishing Scam Email Signs You Must Know | MailSafi 2021","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#primaryimage"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/Dont-get-scammed.png","datePublished":"2021-07-17T13:42:33+00:00","dateModified":"2021-07-19T10:46:42+00:00","description":"On their own, email filters are not enough to fight spam. You must learn how to recognize phishing scam emails to prevent yourself from becoming a victim. Here are 13 ways to get you started.","breadcrumb":{"@id":"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#primaryimage","url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/Dont-get-scammed.png","contentUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/07\/Dont-get-scammed.png","width":873,"height":328,"caption":"Business email - don't get scammed"},{"@type":"BreadcrumbList","@id":"https:\/\/mailsafi.com\/blog\/signs-of-a-phishing-scam-email\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailsafi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Recognize Signs of a Phishing Scam Email"}]},{"@type":"WebSite","@id":"https:\/\/mailsafi.com\/blog\/#website","url":"https:\/\/mailsafi.com\/blog\/","name":"The MailSafi Blog","description":"We Stop Spam","publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailsafi.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailsafi.com\/blog\/#organization","name":"Message Labs Africa","url":"https:\/\/mailsafi.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Message Labs Africa"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/msgafricaltd\/","https:\/\/x.com\/msgafricaltd","https:\/\/www.linkedin.com\/feed\/"]},{"@type":"Person","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14","name":"the_leaders","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","caption":"the_leaders"}}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/2959"}],"collection":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/comments?post=2959"}],"version-history":[{"count":10,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/2959\/revisions"}],"predecessor-version":[{"id":2975,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/2959\/revisions\/2975"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media\/2962"}],"wp:attachment":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media?parent=2959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/categories?post=2959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/tags?post=2959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}