New call-to-action
CITE Technology Remote Support
Contact Us
5 min read

5 Easy Ways to Counter Phishing Emails

Feb 3, 2020 12:06:23 PM

5 Easy Ways to Counter Phishing Emails | Cite Tech

Phishing emails invade inboxes daily. In fact, email is the main source of hacked personal and business accounts.

The good news?

By implementing 5 easy steps, we can armor our inboxes, our networks, our lives against hackers. Let’s outsmart this headache before it begins!

The easiest way for Hackers to plunder our personal information is through email. Phishing emails invade. These dormant destroyers sit silently. Anticipating. Like Pandora's box, waiting to be discovered. 

Take hope! Practicing the 5 steps above arm and advance to prevent cyber incidents. Together, we can conquer phishing emails!

Keep reading and learn 5 easy ways to counter phishing emails

New call-to-action

1 - Analyze Email Addresses

Phishing emails mimic legitimate addresses. Villains incorporate genuine company names within the composition of both web addresses and emails. How to counter-attack? 

  1.  Pause. 

  2. Notice the sender’s email address. In a brief moment, analyzing the address reveals if the sender is genuine or a hoax. A high-jacked version of someone else’s email address may read “@hilton.rewards” versus an authentic sender, such as “”. 

  3. Extend your counter-attack technique into the body of the email. That is, analyze every link within the text by hovering/inspecting before clicking. Why? Because criminals cleverly interweave malicious and authentic links throughout emails.  

2- Beware of Bad Grammar 

This is the most obvious mode of defense. If the structure or grammar within the body of the message leaves you raising an eyebrow, it's most likely a phish!

Phishing Email Grammar Alerts: 

  • Grammatical Errors

  • Spelling Mistakes

  • Awkward Manners of Expression

Keep in mind that businesses invest in advertising. Professional writers and editors are hired. Legality, grammar, and spelling are valued. So, when a business email contains mistakes in these areas, it smells like a phish. 

Why do these poorly written emails still circulate?

We've wondered the same. Intriguingly, authors Levitt and Dubner may have an answer. They suggest that poorly written emails eliminate “false positive” responses.

Hence, these emails actually shape the target audience for the hackers. Criminals know they're most likely to succeed in conning money from persons gullible enough to respond to these poorly-crafted emails.

Adversely, persons clued into the illegitimacy (by the poor craftsmanship) of these emails are a waste of the hackers' time. 

New call-to-action

3 - Stay Smart (never share personal information)

Authenticity is the hacker’s goal. Great lengths are taken. An email may replicate the style used by your bank, or even your own company.

However, "sound the alarm!" whenever unusual requests are made. 

Does the email request unusual personal information (banking details or login credentials)? 

In this case, stay smart, and stay away. If there’s reason to believe this email could be valid, contact the company directly. Ignore the contact information offered within this email! 

4 - Don’t React When Rattled! 

Provoking panic is an age-old phishing technique. Unfortunately, it’s still in use today. Whether an email claims that your account teeters on the brink of closure, or that it is compromised (requiring your login information for verification), you must fight the temptation to respond immediately.

Take a breather, Be MINDFUL, Ask questions: 

“Does this email provoke anxiety?” 

“Does this message request a reasonable response?”

If not feeling 100% settled about an email, contact the sender company via venues outside of this email. And never, ever give personal information or account information to this source. 

New call-to-action

5 - Test Attachments

Red flags should blaze wildly on your radar if a random company sends an email with an attachment to your inbox. If  the attachment's subject matter isn’t anticipated by you, then it probably isn’t safe.

How unsafe? This attachment might contain a malicious trojan or URL.

Click, and boom: the virus or malware installation process begins. Scanning attachments ( even legit ones ) with anti-viral software keeps your PC or network secure. 


As a managed IT service provider, here are some of the data backup and protection services CITE offers:


  • Let us manage, troubleshoot, and verify your backups for one monthly fee

  • Receive daily emails to verify backup status

  • Protect your business from data loss, ransomware, employee error, etc.

  • We can customize your backup solution that works best for your business

  • Never worry about losing precious data essential to your business

  • Access to your files anytime you need them

  • Reliable and Secure data transmission

  • Complete data recovery

New call-to-action

ABout CITE TEchnology

CITE Technology Solutions | Lafayette LA

Cite Technology Solutions strives to provide the very best in IT solutions.  From System Administration to Medical Imaging applications our team of integrators provides solutions.

We provide comprehensive IT solutions for small and mid-sized organizations with complex needs. Offering 24/7 Tech Support, Remote Support and Cloud Storage. We specialize in data management, VOIP, medical imaging, HL7 interfacing, and HIPAA compliance. Whether its remote access or at home, our team of IT Experts can assist.


Stay Connected!

Curious about information technology solutions and what all the recent hype is about? Sign up today!