Phishing: How to be Your Own Email Detective
- William Heaney
- Jul 23
- 2 min read
Updated: Jul 24
Phishing is a dangerous and malicious scam designed to trick victims into revealing sensitive information, which is then used to exploit them. This can include taking out loans in the victim’s name, stealing login credentials, or even creating new credit cards or driver’s licenses under their identity.
To avoid falling for these scams, it's important to recognize the signs and learn how to distinguish between legitimate emails and those that seem a little “phishy.” Here are three steps to help you spot a suspicious email:
Step 1: Email Address
Start by examining the sender’s email address. If the message claims to be from a bank or another trusted organization that handles sensitive information, double-check the domain. Phishing attempts often use email addresses that look strange or contain misspelled words.
Step 2: Email Body
Next, read the subject line and the content of the email carefully. Many phishing emails attempt to create a false sense of urgency to pressure you into acting without thinking. They may claim your account is locked, that you've won a prize, or that you need to verify your information immediately.
Be cautious if an email includes any of the following red flags:

Generic greetings like “Dear Customer” instead of your name
Poor grammar or spelling errors
Strange or inconsistent formatting
Requests for personal information (logins, credit card numbers, Social Security numbers)
Prompts to click on links or download attachments
Never click on links or download attachments in a suspicious email. Doing so could install malware on your computer, another tactic used by cybercriminals. Malware can steal your data, track your activity, or damage your system.
Step 3: Protection from Phishing
Being aware of phishing is the first step, but protection goes further. One of the best defenses is multi-factor authentication (MFA) or two-factor authentication (2FA) for your online accounts. Even if a scammer gets your password, they’ll still need a second form of verification—such as a fingerprint, a texted code, an email confirmation, or answers to security questions.
Stay alert and cautious. Phishing scams come in all shapes and sizes, and attackers constantly evolve their tactics. Being informed is your best defense.

Comments