Cyber

How to avoid getting “hooked” by a phishing scam

woman using laptop

According to the FBI’s Internet Crime Complaint Center, people lose $57 million in phishing schemes each year.* To keep yourself, your family, and your assets safe from phishing scams, it’s important to understand what they are and how to spot them so you can avoid getting “hooked.” This article outlines the basics you need to know.

What is a phishing scam?

Hackers often use phishing emails or text messages to try and get you to perform a specific task, such as clicking on a malicious link, opening a malware-infected attachment, or providing sensitive personal information or login credentials. Socially engineered phishing emails and texts are the most dangerous, because they often look like the real thing, posing as a company you know and trust. 

How to identify a phishing email or text

While bad actors can be clever, there are often ways to spot a phishing email or text, if you pause and look closely. They may:

 

  • Threaten negative action unless you do something NOW. Phishing emails and texts are designed to make you panic by claiming your account will be closed or has been compromised – and the only way to make it right is to perform the action (click the link, open the attachment, or enter your information) right now. Any time an email or text makes a threat or demands urgent action, you should be suspicious. Banks and other legitimate businesses will never send emails or texts like that.
  • Ask you to confirm personal information, login credentials, or sensitive data. Although they may look authentic, phishing emails and texts will ask for information that banks and other legitimate businesses would never ask you to provide, such as personal information, banking details, or login credentials.
  • Sound unprofessional. May include poor grammar, spelling mistakes, or unusual greetings. Phishing emails and texts may be poorly written, including grammar that isn’t quite right, spelling mistakes, or language that just doesn’t sound professional. If it looks like it’s coming from a colleague or friend and starts with “Dear” or another formal greeting, you should also be suspicious.
  • Have web and email addresses that don’t jive. One of the easiest ways to spot a phishing scheme is to look at the email address it’s coming from. If it doesn’t match the company or website that you’re familiar with, or it comes from an email address that is not obviously associated with the supposed sender, it is probably from a bad actor. You may need to look closely to see the difference.
  • Include suspicious attachments or links. If you’re not expecting an email with an attachment or link from a company or person, you should always use caution, as it could be malicious. Even if you think it’s legitimate, take the time to scan it using antivirus software.
  • Sound too good to be true. Some phishing emails will try to incentivize you into clicking on a link or attachment to collect a “reward” of some kind. If it sounds too good to be true, it probably is.
  • Play on your emotions around a recent world event. Bad actors are also very good at using local or world events to trigger emotions and get people to take action. For example, they might send an email claiming to know the cure for COVID-19 or asking for donations to a local town devastated by wildfires. These may seem authentic, but you’ll need to look closely to make sure.

The Blink bottom line

Congratulations, you’re “o-phish-ally” schooled in tips and tricks to help spot phishing schemes. Continue to be diligent, question what seems off and, back up your data regularly (and then again after that)!

Blink℠ by Chubb® Cyber Insurance

Easy, effortless insurance for everyone.

*Federal Trade Commission, Consumer Information, “How to Recognize and Avoid Phishing Scams,” consumer.ftc.gov

Insights and expertise

We help you stay ahead and informed with these helpful tips and tricks for protecting your home, car, and more.
woman holding her phone
Cyber
Tips for avoiding identity theft | Chubb
Many sources for Identity Theft are out of your control. But you can control some potential sources of ID theft and reduce your chances of becoming a victim. Here are some ways.
woman working in home office
Cyber
10 tips to stay cyber safe when you’re working from home
Cyber criminals know that, with more people online, there are more ways to take advantage of vulnerabilities to gain access to protected and personal information.
upset woman with computer
Cyber
How to know if you’re a victim of identity theft
As we spend more of our lives online – working, going to school, shopping, and more – we face an increasing risk for identity fraud. That’s why we need to be aware of the top warning signs that indicate you may be a victim of identity theft.
person using tablet
Cyber
MISSING! What to do if your phone or computer is stolen
Acting quickly can help prevent bad actors from engaging in identity theft and other fraudulent activity.
payment with online banking
Cyber
5 steps to take if you believe your identity has been stolen
These proactive measures can help safeguard your personal information.
credit card and lock
Cyber
9 tips to help protect your identity during tax season
Tax season is an opportune time for identity theft. But if you know what to look for and what NOT to do, you can help protect your identity and keep your hard-earned money.
lock on keyboard
Cyber
Securing personal data with multifactor authentication
Cyber security is not something you want to risk. Two-factor authentication protects your data and identity against internet criminals.
two bully boys posting video
Cyber
9 ways to protect your kids from cyberbullies
With so much time spent on a computer, gaming system, tablet, or cell phone, it’s no wonder bullies are taking advantage of those in cyberspace. Learn more about the top ways to help protect your kids from cyberbullies.
hands texting professional
Cyber
Smishing: A cyber security threat
Smishing is growing in popularity as a form of cyberattack. Learn how it works and how to protect yourself.
woman holding a phone
Cyber
Do you need a social media policy for your nanny?
Does your nanny have a smartphone addiction? Not only can this impact his or her productivity, but it could put your family at risk. If your nanny posts your children's location or other personal details on social media, it could end up in the wrong hands of kidnappers or cybercriminals. Here's how to create a social media policy to keep your family safe.

Find an Agent

Speak to an independent agent about your insurance needs.

This document is advisory in nature and is offered as a resource to be used together with your professional insurance advisors in maintaining a loss prevention program. It is an overview only, and is not intended as a substitute for consultation with your insurance broker, or for legal, engineering or other professional advice.

Chubb is the marketing name used to refer to subsidiaries of Chubb Limited providing insurance and related services. For a list of these subsidiaries, please visit our website at www.chubb.com. Insurance provided by ACE American Insurance Company and its U.S. based Chubb underwriting company affiliates. All products may not be available in all states. This communication contains product summaries only. Coverage is subject to the language of the policies as actually issued. Surplus lines insurance sold only through licensed surplus lines producers. Chubb, 202 Hall's Mill Road, Whitehouse Station, NJ 08889-1600.