{"id":5064,"date":"2018-08-17T15:30:33","date_gmt":"2018-08-17T10:00:33","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=5064"},"modified":"2020-08-18T20:18:44","modified_gmt":"2020-08-18T14:48:44","slug":"7-tips-to-avoid-phishing-attacks","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/","title":{"rendered":"Tips to Avoid Phishing Attacks"},"content":{"rendered":"<div itemscope itemtype=\"http:\/\/schema.org\/ImageObject\">\n<meta itemprop=\"name\" content=\"Phishing Attacks\"><br \/>\n<img decoding=\"async\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/phishing-attacks.png\" class=\"img-responsive\" alt=\"Phishing Attacks\" itemprop=\"contentUrl\"\/><br \/>\n<meta itemprop=\"datePublished\" content=\"2018-08-16\"><br \/>\n<meta itemprop=\"description\" content=\"Phishing attacks are not only annoying but also dangerous to your computer and data. Hence, install free antivirus software today \">\n<\/div>\n<p>In an organization, Employees play a vital role in information security. Thus it is critical for organizations to educate employees about safe computing habits in addition to having the right security tools (such as <a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus.php\" rel=\"noopener\" target=\"_blank\" title=\"antivirus software\">antivirus software<\/a> or <strong>virus protection software<\/strong>) in place.<\/p>\n<p>Employees hold the necessary credentials needed for the success of a breach of the company&#8217;s security. Hackers obtain that protected information from employees through phishing attacks.<\/p>\n<p>The ultimate aim of <em>phishing attacks<\/em> is to collect sensitive information from victims (employees in this case) and use that information to gain unauthorized access to protected data, networks, etc.<\/p>\n<p>Spam refers to the unsolicited emails especially advertising emails sent to a group of recipients. Unsolicited emails mean the recipient did not grant permission for receiving those emails.<\/p>\n<p>Email spam and phishing attacks are not only annoying but also dangerous to users. Email spam is nothing but junk email or unsolicited bulk emails sent through the email system.<\/p>\n<p>In phishing attacks, hackers send fake e-mails to gather sensitive private information for identity theft and other criminal efforts. While phishing e-mails can look like legitimate emails from a reputable company or bank, they are sent by cybercriminals.<\/p>\n<p>Spoofing is a type of fraudulent email activity in which cybercriminals send email messages from a forged sender address. For a regular user, the emails appear to come from one legitimate user, but they are coming from someone completely different.<\/p>\n<p>Here are seven easy tips on how to prevent phishing attacks and prevent cyber criminals from stealing your credentials.<\/p>\n<p><strong>Tips To Avoid Phishing Attacks<\/strong><\/p>\n<p><strong>Tip 1:<\/strong> Legitimate businesses or banks will not use email communications to request key account information, banking passwords, verification of security questions or other sensitive information.<\/p>\n<p><strong>Tip 2:<\/strong> Even if such emails you receive have a \u201c.com address\u201d of a reputable brand or organization you know, if it seems different, you should check with that brand or organization directly. Instead of responding to such fake emails, call or chat with the customer care executives to get a clear idea of that email.<\/p>\n<p><strong>Tip 3:<\/strong> If you suspect an email to be a phishing scam, it is advisable to delete that email rather than responding to it.<\/p>\n<p><strong>Tip 4:<\/strong> If the hypertext links in the emails you received don\u2019t contain the original bank\u2019s name, it is a clear sign of phishing scam. It is advisable to delete that email rather than responding to it. You can check the hypertext links by hovering the mouse over the link (without clicking it).<\/p>\n<p><strong>Tip 5:<\/strong> Do not open e-mail attachments with &#8220;.scr,&#8221; &#8220;.com&#8221; and &#8220;.exe&#8221; file extensions as they are likely to be malicious.<\/p>\n<p><strong>Tip 6:<\/strong> Always report such emails or suspicious activity to the original business or organization that is being spoofed.<\/p>\n<p><strong>Tip 7:<\/strong> Never click on hypertext links in e-mails claiming to be from a legitimate business or organization. Many of these phishing emails can download <a href=\"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/\" rel=\"noopener\" target=\"_blank\">Trojan horse viruses<\/a> and other malware onto your computer when you click on the links in those e-mails.<\/p>\n<p>Most important of all, install a reputable <a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\" rel=\"noopener\" target=\"_blank\" title=\"antivirus software\">antivirus software<\/a> such as Comodo Antivirus to prevent malware intrusion on your system.<\/p>\n<p>By following the suggestions mentioned above, you protect personal information from phishing scams and also prevent malware intrusion on your computer.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<p><strong>Related Resources:<\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/free-virus-removal-software.php\" target=\"blank\">Virus Removal<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus.php\" target=\"blank\">Antivirus Software<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\" target=\"blank\" rel=\"noopener\">Best Antivirus<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/antivirus-for-android.php\" target=\"blank\" rel=\"noopener\">Antivirus for Android<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/virus-protection.php\" target=\"blank\" rel=\"noopener\">Virus Protection<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/wordpress-security.php\" rel=\"noopener\" target=\"_blank\">WordPress Security<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/website-status-checker.php\" rel=\"noopener\" target=\"_blank\">Website Status<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In an organization, Employees play a vital role in information security. Thus it is critical for organizations to educate employees about safe computing habits in addition to having the right security tools (such as antivirus software or virus protection software) in place. Employees hold the necessary credentials needed for the success of a breach of [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":5065,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[9,217,90],"class_list":["post-5064","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-comodo-news","tag-antivirus","tag-phishing-attacks","tag-virus-protection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>7 Ways To Prevent Phishing Attacks | Comodo Antivirus<\/title>\n<meta name=\"description\" content=\"Here are best 7 tips to avoid phishing attacks. Install a reputed antivirus software such as Comodo Antivirus to prevent malware intrusion on your system.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Ways To Prevent Phishing Attacks | Comodo Antivirus\" \/>\n<meta property=\"og:description\" content=\"Here are best 7 tips to avoid phishing attacks. Install a reputed antivirus software such as Comodo Antivirus to prevent malware intrusion on your system.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-17T10:00:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-18T14:48:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/phishing-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"225\" \/>\n\t<meta property=\"og:image:height\" content=\"170\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/\",\"name\":\"7 Ways To Prevent Phishing Attacks | Comodo Antivirus\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/phishing-attack.jpg\",\"datePublished\":\"2018-08-17T10:00:33+00:00\",\"dateModified\":\"2020-08-18T14:48:44+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Here are best 7 tips to avoid phishing attacks. Install a reputed antivirus software such as Comodo Antivirus to prevent malware intrusion on your system.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/phishing-attack.jpg\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/phishing-attack.jpg\",\"width\":225,\"height\":170,\"caption\":\"phishing attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tips to Avoid Phishing Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 Ways To Prevent Phishing Attacks | Comodo Antivirus","description":"Here are best 7 tips to avoid phishing attacks. Install a reputed antivirus software such as Comodo Antivirus to prevent malware intrusion on your system.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/","og_locale":"en_US","og_type":"article","og_title":"7 Ways To Prevent Phishing Attacks | Comodo Antivirus","og_description":"Here are best 7 tips to avoid phishing attacks. Install a reputed antivirus software such as Comodo Antivirus to prevent malware intrusion on your system.","og_url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2018-08-17T10:00:33+00:00","article_modified_time":"2020-08-18T14:48:44+00:00","og_image":[{"width":225,"height":170,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/phishing-attack.jpg","type":"image\/jpeg"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/","url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/","name":"7 Ways To Prevent Phishing Attacks | Comodo Antivirus","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/phishing-attack.jpg","datePublished":"2018-08-17T10:00:33+00:00","dateModified":"2020-08-18T14:48:44+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Here are best 7 tips to avoid phishing attacks. Install a reputed antivirus software such as Comodo Antivirus to prevent malware intrusion on your system.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/phishing-attack.jpg","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/phishing-attack.jpg","width":225,"height":170,"caption":"phishing attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/7-tips-to-avoid-phishing-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Tips to Avoid Phishing Attacks"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=5064"}],"version-history":[{"count":19,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5064\/revisions"}],"predecessor-version":[{"id":14881,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5064\/revisions\/14881"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/5065"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=5064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=5064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=5064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}